Strategic Use New Media Peaceful Social Change
1Uy7LZ0
1Uy7LZ0
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
GUIDEBOOK FOR THE<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong><br />
for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
DALIA HAJ-OMAR<br />
a project by<br />
Sawtna<br />
.net
Copyright © 2015 by Dalia Haj-Omar<br />
This work is licensed under the Creative Commons Attribution-ShareAlike<br />
4.0 International License. To view a copy of this license, visit<br />
http://creativecommons.org/licenses/by-sa/4.0.<br />
ISBN 978-0-9838647-9-0<br />
Credits<br />
Photo credits<br />
Front cover: Bashir Hamid<br />
Chapter 1: <br />
Chapter 2: <br />
Chapter 3: <br />
Chapter 4:<br />
Chapter 5: <br />
Conclusion:<br />
Design and layout<br />
Plain Sense, Geneva<br />
cover – hajooj kuka<br />
page 14 – Amir Ahmad Nasr<br />
cover – hajooj kuka<br />
page 38 – hajooj kuka<br />
page 44 – Khalid Albaih<br />
page 50 – Olivier Laban-Mattei/AFP/Getty Images<br />
cover – hajooj kuka<br />
page 65 – hajooj kuka<br />
page 92 – UN Photo/Tim McKulka<br />
cover – hajooj kuka<br />
page 103 – hajooj kuka<br />
page 112 – Salahaldeen Nadir<br />
cover – Maxkabakov, Dreamstime.com<br />
page 128 – Dwnld777, Dreamstime.com<br />
page 146 – Maxkabakov, Dreamstime.com<br />
cover – Salahaldeen Nadir<br />
Sawtna<br />
.net<br />
www.sawtna.net<br />
info@sawtna.net
GUIDEBOOK FOR THE<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong><br />
for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong>
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> iii<br />
Contents<br />
Acknowledgements<br />
v<br />
Introduction 1<br />
Why this guidebook and what to expect 1<br />
Chapter 1: Blogging 5<br />
The global debate: the impact of ICTs on collective action<br />
and social change 7<br />
The Egyptian blogosphere before the Revolution 12<br />
Interviews: A snapshot of the Sudanese blogosphere 14<br />
A conversation with Sudanese blogger Amir Ahmad Nasr 14<br />
Reflecting on Sudan’s contemporary blogosphere with<br />
Omnia Shawkat 20<br />
Why do you need a blog in the age of Twitter and Facebook? 25<br />
Choosing a blog platform: Blogger, Wordpress and Tumblr 26<br />
Chapter 2: Twitter 29<br />
A brief introduction to Twitter 31<br />
How to gain followers on Twitter 32<br />
How to organize a social media campaign 38<br />
Measuring impact: social media analytics and real-time<br />
tracking of online campaigns 40<br />
Interview with Sudanese cartoonist Khalid Albaih 44<br />
Citizen journalism during Iran’s “Green Revolution” 50<br />
Revisiting the offline and digital campaign for Nuba<br />
Mountains detainee Jalila Khamis 53<br />
What Sudanese activists are learning from digital campaigns<br />
for political detainees 57<br />
Some useful social media applications 58
iv <strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Chapter 3: Crisis mapping 61<br />
Crowdsourcing: definitions and practical uses 63<br />
Crisis mapping: a basic introduction 65<br />
Other mapping platforms and what they offer 69<br />
Top crisis mapping challenges and selected solutions 74<br />
Interviews 79<br />
The uses and challenges of crisis mapping in Sudan and<br />
what we are learning 79<br />
How HarassMap in Egypt is using crisis mapping to fight<br />
the sexual harassment of women 84<br />
Fareed Zain: Sudan Vote Monitor 92<br />
Chapter 4: Crowdfunding 95<br />
A basic introduction to crowdfunding 97<br />
Trends in crowdfunding and the rise of civic crowdfunding 100<br />
Crowdfunding for countries under US sanctions 103<br />
Choosing a crowdfunding platform 105<br />
The story of #Nafeer: crowdsourcing in action 109<br />
How to run a successful crowdfunding campaign 112<br />
Interview 115<br />
Crowdfunding for the OUR SUDAN short film 115<br />
Chapter 5: Digital security 119<br />
Why digital security matters: global trends and the decline<br />
in net freedoms 121<br />
Internet freedoms in Sudan 124<br />
Protection against viruses, spyware and malware 128<br />
Using phones and mobile devices securely 130<br />
Resources for digital activists at risk 137<br />
Foundations for safe online browsing and communication 139<br />
Interviews 146<br />
The basics of digital security 146<br />
Mesh networking as a solution for poor connectivity or<br />
network interruptions 149<br />
Sudanese civil society and its digital security challenges 152<br />
Conclusion 155
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> v<br />
Acknowledgements<br />
This guidebook was inspired by the creative and free spirit of youth-led<br />
movements and civil society, in Sudan and globally, who are using information<br />
and communication technologies (ICTs) for peaceful social change. It is the<br />
outcome of my personal journey, a product of learning-by-doing, and a gift<br />
to a new generation in the hope that it can move forward from where others<br />
left, and not start from scratch.<br />
I am particularly thankful to the generous contribution of ten artists, writers,<br />
activists, civil society practitioners and experts working on the intersection of<br />
technology and human rights, peacebuilding and democracy or using ICTs<br />
to expand the impact of their work in these fields. They include: Amir Ahmad<br />
Nasr, Omnia Shawkat, Khalid Albaih, Helena Puig Larrauri, Rebecca Chiao,<br />
Fareed Zain, Dimah Abdulkarim, Eric Johnson, Nat Meysenburg and Abdel-<br />
Rahman El-Mahdi. Through in-depth interviews, they have shared their<br />
valuable insights and experiences, making this guide much more practical,<br />
and complementing the case studies with compelling real-life wisdom. Their<br />
stories taught me that passion and creativity can transform ICTs into tools<br />
for social good – especially when the technology is used strategically.<br />
A special thank you to colleagues who edited the final English manuscript,<br />
and to Rodrigo Davies and Helena Puig Larrauri for peer reviewing and<br />
lending their expertise to the chapters on crisis mapping and crowdfunding.<br />
Deep gratitude to Mohammed Al Maskati for teaching me about digital<br />
security in the most entertaining and fluid manner.<br />
I am endlessly grateful to the small team that made the journey enjoyable.<br />
The first iteration of this guidebook was released on the bilingual website<br />
that can be used in parallel with the guidebook www.sawtna.net. This would<br />
not have been possible without the technical support and diligence of web<br />
developer and designer Mosaab Baba. The talented translator and editor<br />
Azaz Shami oversaw the Arabic translation and editing of both the website<br />
and this guidebook. hajooj kuka provided illustrations, infographics and<br />
photography support. Animation artist and graphic designer, Bashir Hamid,<br />
created the front cover. And many others – especially my family – kept me<br />
going through their encouragement, thoughtful feedback and support.
vi <strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Key to icons<br />
Additional readings and materials.<br />
Case studies.<br />
Interviews.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 1<br />
Introduction<br />
INTRODUCTION<br />
Why this guidebook and what to<br />
expect<br />
The role of information and communication technologies (ICTs) and especially<br />
social media, in exchanging and disseminating information and enhancing<br />
public awareness as well as enabling collective action, collaborative<br />
initiatives and rapid mobilization, has now become a non-contested matter<br />
of fact. Some have gone as far as calling them “liberation technologies” that<br />
have helped herald a “fourth wave of democracy” in parts of the Middle East<br />
and North Africa in recent years. 1<br />
Those technologies were mostly embraced by non-organized citizens in<br />
closed societies where the physical space for discussion was not available<br />
and where thousands of people were moving to virtual spaces online to<br />
allow the free expression of opinions, the building of complex networks,<br />
the creation of social capital and finally political/social organization and<br />
mobilization. 2<br />
Digital technology has therefore revolutionized the way citizens and interest<br />
groups communicate and share information as well as the ease, scope and<br />
reach of activities due to the speed, reliability, scale, relative security and low<br />
cost of digital networks. 3<br />
To capitalize on these “liberation technologies,” this guide is written with the<br />
intention of targeting the Sudanese civil society in its most diverse sense,<br />
including journalists, pro-democracy activists, youth movement members<br />
and those working in the humanitarian sector, as well as non-organized<br />
citizens seeking to increase their civic participation in the public domain<br />
and online. It is a “how to” guide that stirs users toward good practices in<br />
using social media and ICTs more strategically for advocacy, campaigning,<br />
mobilization, dissemination of information and crowdsourcing. Our<br />
discussion will shed light on how digital activism is being used; when it is<br />
successful; and what impact it has on social movement processes and on<br />
the scale of change.<br />
1 Philip N. Howard and Muzammil M. Hussain. Democracy’s Fourth Wave? Digital<br />
<strong>Media</strong> and the Arab Spring. Oxford University Press. 2013.<br />
2 Ibid., pp. 17-18.<br />
3 Mary Joyce. Digital Activism Decoded: The <strong>New</strong> Mechanics of <strong>Change</strong>.<br />
International Debate Education Association, <strong>New</strong> York and Amsterdam. 2010.<br />
P. viii.
2<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Mobile phone subscribers in Sudan 2012-2013<br />
88%<br />
More<br />
than 27 million phone<br />
subscribers and coverage of 88<br />
percent, extending to 800 cities<br />
Data source: National Telecommunications Corporation (NTC), 2013.<br />
Sudan’s mobile and internet penetration<br />
100<br />
In 2012 Sudan’s Intenet penetration rate stood at 21% and mobile<br />
penetration at 60.49%. Sudan boasts the cheapest mobile post paid<br />
costs in the Middle East & North Africa, and healthy market competition<br />
amongst four telecom operators.<br />
90<br />
80<br />
70<br />
60<br />
50<br />
40<br />
30<br />
20<br />
10<br />
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013<br />
Mobile penetration rate (%)<br />
Internet penetration rate (%)<br />
Data source: International Telecommunications Union & World Bank.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 3<br />
The ICT sector in Sudan has experienced a remarkable boom in the last<br />
decade with a steadily increasing internet penetration rate of 23 percent in<br />
2013 (up from 21 percent in 2012, 19 percent in 2011, and 16.7 percent<br />
in 2010). 4 Mobile phone penetration has also seen a sharp increase since<br />
2000, standing at 75 percent by the end of 2013 – according to the<br />
International Telecommunication Union (ITU). 5 Although there are no hard<br />
statistics, our experience tells us that more citizens (especially youth) in<br />
Sudan are accessing the internet on their mobile phones than ever before.<br />
This is mainly because Sudan also boasts the cheapest post-paid mobile<br />
phone costs in the Middle East and North Africa (2012), made possible due<br />
to healthy market competition amongst four telecommunications providers.<br />
In early 2013, the National Telecommunications Corporation (NTC) reported<br />
more than 27 million cell phone subscribers in 2012 and a coverage of 88<br />
percent that extends to 800 cities and towns.<br />
This guide will build on the above-mentioned gains in Sudan’s ICT<br />
infrastructure. It is meant to be user-friendly and will draw from the experience<br />
of Sudanese youth movements and civil society groups that actively use new<br />
media and ICTs, as well as from the regional and international experience<br />
of civil society in countries such as Egypt, Iran, and Kenya, to mention a<br />
few. This will be done by providing a rich array of case studies, interviews,<br />
analysis, theories and examples to help guide you toward being better digital<br />
communicators; designing better online campaigns; and understanding<br />
what combination of digital tools can work to serve you more efficiently.<br />
The guide also assumes that its users are already using social media and<br />
ICTs to some extent and are looking for resources to improve their strategies<br />
and expand their tools beyond what is traditionally used.<br />
While this guide will explain the evolution and potential use of a variety of<br />
digital applications and tools (such as blogs, Tumblr, Twitter and Facebook)<br />
as well as concepts (such as crowdsourcing, crowd fundraising, crisis<br />
mapping and digital security), except for the case of Twitter, it will not teach<br />
you how to use these tools as much as it will guide you toward resources<br />
to investigate the tools and enrich your understanding on how to use those<br />
applications to their maximum potential when working for peaceful social<br />
change and expanded civic participation.<br />
INTRODUCTION<br />
4 http://data.worldbank.org/indicator/IT.NET.USER.P2.<br />
5 ITU data. Sudan mobile subscribers from 2000 to end of 2012.
CHAPTER 1<br />
Blogging<br />
BLOGGING<br />
1
6<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CHAPTER 1<br />
Blogging<br />
This chapter begins with an overview of the global<br />
conversation that activists, as well as internet<br />
and social media scholars, are having regarding<br />
the impact of ICTs on collective action and social<br />
change.<br />
We then move our focus to blogging and its advantages by first looking at<br />
the Egyptian blogosphere prior to Egypt’s 2011 revolution and how activists<br />
who doubled as citizen journalists and bloggers challenged the limits of<br />
press freedom and freedom of expression during Mubarak’s era.<br />
Shifting the focus toward Sudan we have two interviews about the Sudanese<br />
blogosphere and its evolution since 2006. Sudanese blogger and author<br />
Amir Ahmad Nasr spoke about the early years of the Sudanese blogosphere<br />
as well as his journey as a blogger that culminated in the publication of his<br />
book in 2013, My Isl@m: How Fundamentalism Stole My Mind – and Doubt<br />
Freed My Soul. 6 Cultural analyst Omnia Shawkat gives us an overview<br />
of currently active bloggers, the overriding themes in today’s Sudanese<br />
blogosphere, and how it reflects the country’s cultural scene.<br />
We conclude with a brief discussion on why blogging matters in the age of<br />
Facebook and Twitter. We then present a practical comparison between<br />
three popular and free blogging platforms (Blogger, Wordpress and Tumblr),<br />
explaining what they are best suited for and who should use them. This also<br />
encompasses a discussion about domain names and hosting options for<br />
personal and/or institutional blogs.<br />
6 Amir Ahmad Nasr. My Isl@m: How Fundamentalism Stole My Mind – and Doubt<br />
Freed My Soul. St. Martin’s Press. 2013.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 7<br />
The global debate: the impact<br />
of ICTs on collective action and<br />
social change<br />
With the advent of Facebook and Twitter, even before the Arab Spring<br />
revolutions in Tunisia and Egypt, a debate erupted about the real impact<br />
of social media tools on peaceful social change and civic engagement. In<br />
his controversial article, Why the revolution will not be tweeted, 7 Malcolm<br />
Gladwell argued against the efficiency of social media tools for activism.<br />
Using the American civil rights movement as a point of reference, he asserted<br />
that online activism allows only weak links or relationships to develop<br />
amongst people. He added that online organizing lacks the hierarchy and<br />
structure required to make organized activities work and endure and that<br />
online activism also lacks the “high risk” that compels people to act.<br />
Responding to Gladwell in Malcolm Gladwell is #Wrong, 8 a prominent<br />
young blogger Maria Popova asserts that, while “slacktivism” (passively<br />
associating with online causes) is a real problem, social media has been<br />
vital in raising awareness about critical issues and galvanizing action around<br />
them. “While awareness is certainly not a sufficient condition for activism, it<br />
is a necessary one,” she adds:<br />
Most human rights violations, from discrimination to genocide,<br />
can be attributed to one or both of two root causes: pluralistic<br />
ignorance (the tendency of a group’s members to incorrectly<br />
believe that the majority condones an injustice) and diffusion of<br />
responsibility (the conviction that someone else will take action<br />
against the injustices we are aware of). It takes a critical mass of<br />
awareness and assignment of responsibility for injustice to end.<br />
While the social web, with its inherent anonymity and predilection<br />
for slacktivism, may do little in the way of assigning responsibility,<br />
it has a monumental effect on awareness.<br />
Popova also debunks Gladwell’s assertion that online activism carries low<br />
risk, by reminding us that political bloggers and online journalists in nondemocratic<br />
countries such as Egypt and Yemen are getting detained for<br />
expressing themselves online. She adds that governments in countries like<br />
China and Uzbekistan are infringing on freedom of speech online through<br />
heavy online censorship and cyber attacks on bloggers and online activists.<br />
Hence, online activism does carry serious physical security risks in closed<br />
societies.<br />
BLOGGING<br />
1<br />
7 The <strong>New</strong> Yorker. Malcolm Gladwell. Why the revolution will not be tweeted.<br />
October 4, 2010.<br />
8 Design Observer. Maria Popova. Malcolm Gladwell is #Wrong. October 6, 2010.
8<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Responding to Gladwell’s point about the lack of hierarchies within the<br />
social web, Popova says: “Ultimately Gladwell’s mistake is seeing online<br />
and offline social networks as disjointed mechanisms.” She insists that<br />
hierarchies within the social web do exist, giving the example that those<br />
with a large following on Twitter can draw on their online network to reach<br />
large audiences.<br />
Giving examples from her personal life, Popova also dispels the claim that<br />
online interactions do not allow strong relationships to be built, adding that<br />
connections on social media can and have led to deep conversations that<br />
then transformed to offline relationships.<br />
<strong>Social</strong> media and internet scholar Clay Shirky, in his book Here Comes<br />
Everybody: the Power of Organizing Without Organizations, 9 points out that<br />
ICTs have created new incentives for groups to act collectively by cutting the<br />
costs and difficulties, which existed in the past, associated with collective<br />
action and with managing groups.<br />
On the other hand, Evgeny Morozov, who studied “the dark side of the<br />
internet” and how it is used to impede democratization, targets the more<br />
optimistic view of the internet. In his book, The Net Delusion: the Dark<br />
Side of Internet Freedom, 10 he stresses that the internet is good and bad<br />
for promoting democratic policy – it helps both dictators and democratic<br />
movements. He cites the Iranian government’s swift reaction after the<br />
“Green Revolution”, when it employed the very tools used by citizen activists<br />
and demonstrators to identify and arrest protesters. 11<br />
His main thesis is that the internet has become the new front for State<br />
propaganda, censorship and surveillance and that social media can<br />
implicate digital activists much more easily than traditional State intelligence.<br />
Morozov cautions against the Western coverage of the internet that is<br />
mostly dedicated to exploring the positive or “Cyber-Utopian” side of<br />
the internet. His philosophy is one of “cyber-realism”, where he urges a<br />
balanced understanding of the way the internet is used. He also cautions<br />
against “slacktivism” 12 and points out that Facebook and Twitter will not and<br />
cannot replace traditional forms of activism; they should only complement<br />
“real-life campaigns”. 13<br />
9 Clay Shirky. Here Comes Everybody: the Power of Organizing Without<br />
Organizations. Penguin Press. 2008. PP. 22-23.<br />
10 Evgeyny Morozov. The Net Delusion: the Dark Side of Internet Freedom. Public<br />
Affairs. 2011.<br />
11 Ibid., p. 11.<br />
12 Foreign Policy Magazine. Evgeny Morozov. The brave new world of slacktivism.<br />
May 19, 2011.<br />
13 Morozov defines “slacktivism” as a “feel-good online activism that has zero<br />
political impact,” and gives those who participate “an illusion of having a<br />
meaningful impact without demanding anything more than joining a Facebook<br />
group.” Ibid.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 9<br />
Global digital snapshot – January 2015 14<br />
A snapshot of the world’s key digital statistical indicators<br />
TOTAL<br />
POPULATION<br />
ACTIVE INTERNET<br />
USERS<br />
ACTIVE<br />
SOCIAL MEDIA<br />
ACCOUNTS<br />
UNIQUE<br />
MOBILE<br />
USERS<br />
ACTIVE<br />
MOBILE SOCIAL<br />
ACCOUNTS<br />
BLOGGING<br />
1<br />
7.210<br />
BILLION<br />
3.010<br />
BILLION<br />
2.078<br />
BILLION<br />
3.649<br />
BILLION<br />
1.685<br />
BILLION<br />
URBANISATION:<br />
53%<br />
PENETRATION:<br />
42%<br />
PENETRATION:<br />
29%<br />
PENETRATION:<br />
51%<br />
PENETRATION:<br />
23%<br />
Figure represents total<br />
global population,<br />
including children<br />
Figure includes access<br />
via fixed and mobile<br />
connections<br />
Figure represents<br />
active user accounts,<br />
not unique users<br />
Figure represents<br />
unique mobile<br />
phone users<br />
Figure represents<br />
active user accounts,<br />
not unique users<br />
We Are <strong>Social</strong> • Sources: Wikipedia; InternetLiveStats, InternetWorldStats; Facebook, Tencent,<br />
VKontakte, LiveIntenret; GMSA Intelligence<br />
14<br />
The Egyptian activist Alaa Abdel Fattah 15 responds to those who caution<br />
against “slacktivism” by reminding them that “slacktivism is a dangerous<br />
notion when you have options to do actual politics, but then choose to<br />
do something easy.” 16 However, in Mubarak’s era “‘slacktivism’ normalized<br />
political participation,” he says. He also adds that in Egypt, “factories and<br />
universities is where the real politics happen,” and the internet supported<br />
that by offering a medium that built “a single narrative that talks about<br />
revolution.”<br />
Zeynep Tufekci, 17 a sociologist who explores the intersection between<br />
technology and society, reflects on the use of technology during the Arab<br />
Spring and how it aided collective action by citizens. 18 Tufekci’s research<br />
and analysis implies that dictators in the Middle East did not fall earlier due<br />
14 We Are <strong>Social</strong> (blog). Digital <strong>Social</strong> & Mobile Worldwide in 2015. January 21,<br />
2015.<br />
15 FastCompany. What Makes Egyptian Blogger Alaa Abdel Fattah so Dangerous?<br />
March 28, 2014.<br />
16 YouTube. Personal Democracy Forum. Video: Alaa abd el Fattah: Weaving a<br />
network for change: Egypt. June 14, 2011.<br />
17 http://technosociology.org.<br />
18 YouTube. Ars Electronica. Public Square Squared – Zeynap Tufekci – EN.<br />
September 4, 2011.
10<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
to a “collective cost problem,” meaning that citizens were not collaborating<br />
effectively because they perceived the costs to be too high (torture,<br />
detention, censorship, restricted organization). According to Tufekci, this<br />
“collective cost problem” was the key factor in allowing authoritarian regimes<br />
to endure for decades.<br />
Although Tufekci acknowledges that there were multiple factors that led to<br />
the toppling of dictators in Egypt and Tunisia through popular revolt, she<br />
also credits the “new-media ecology” composed of satellite TV, cell phones<br />
with video capacity and social media platforms (Facebook and Twitter).<br />
This “new-media ecology” made it much harder for governments to censor<br />
and break up complex many-to-many networks of citizens connecting via<br />
social media after expressing common preferences for change. However,<br />
Tufekci cautions that, although new media tools have worked in creating a<br />
“cascade” to get rid of unpopular dictators, it is not clear how those same<br />
tools will work in the democratization phase.<br />
She adds that huge mobilizations, organized via social media, have often<br />
not led to changes in policies at the desired scale in countries like Egypt,<br />
Turkey and Ukraine. The reason, she says, is that social media have had<br />
the effect of a double-edged sword: they allow fast, large-scale and cost<br />
efficient mobilization, but valuable time is lost that (before the advent of the<br />
internet) was used to slowly organize and strategize, in order to identify<br />
tactics that will sustain momentum. 19<br />
In her critique of Morozov’s book, The Net Delusion, Tufekci asserts that<br />
the internet has been one of the most empowering technologies in human<br />
history, and that the problem lies not with the technology, but with “citizen<br />
disempowerment” and “politics that has failed.” She continues to say:<br />
I do think Morozov underestimates the ecological effect of the<br />
Internet in potentially undermining the legitimacy of authoritarian<br />
regimes. Crushing of dissidents individually may certainly help<br />
an authoritarian regime remain in power in the short term, but<br />
too much repression, coupled with an unhappy citizenry that is<br />
able to share their displeasure with one another, can hollow out a<br />
regime’s legitimacy, ultimately crippling its capacity for repression,<br />
as there is almost no purely coercive regime. In other words, while<br />
increased capacity for surveillance may be a very real threat to<br />
individual dissidents, broadening the repressive apparatus often<br />
ultimately backfires, especially under conditions with lower barriers<br />
to collective action and information diffusion, both of which are<br />
promoted by the Internet. 20<br />
19 <strong>New</strong> York Times. Zeynep Tufekci. After the Protests. March 19, 2014.<br />
20 The Atlantic. Zeynep Tufekci. Delusions Aside, the Net’s Potential Is Real.<br />
January 12, 2011.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 11<br />
A research study by the University of Washington in Seattle, looking at the<br />
relationship between digital activism and non-violence, collected the first<br />
comprehensive data set of protests from around the world. 21 The study<br />
concluded that digital activists rarely resorted to cyber-crimes or hacking,<br />
and that Facebook and Twitter were the social media tools that globally<br />
dominated digital campaigns. However, the study also noted that there were<br />
variations across regions and that there is no “‘killer app’ that makes some<br />
campaigns more successful than others.” The more diverse is the digital<br />
toolkit, the higher the possibility of success. The target of digital campaigns<br />
also mattered: “If the objective is change of government or government<br />
policy, civil society groups have demonstrated success with just modest<br />
street protests and a few digital tools. Both recipes for success are true<br />
regardless of regime type.” 22<br />
BLOGGING<br />
1<br />
Some videos to watch<br />
Al Jazeera Stream. Cyber realism versus Cyber-utopians. 23<br />
TED Talk. Evgeny Morozov: How the Net aids dictatorships. 24<br />
Personal Democracy Forum. Alaa abd el Fattah: Weaving a network for<br />
change: Egypt. 25<br />
Zeynep Tufekci speaks about social media and collective action under<br />
authoritarian regimes. 26<br />
21 Frank Edwards, Philip N. Howard and Mary Joyce. Report on Digital Activism<br />
and Non-Violent Conflict. November 20, 2013.<br />
22 The first data set included a total of 1,180 cases from 151 countries from 1982 to<br />
2012. Another data set was comprised of 426 coded cases from 100 countries<br />
between 2010 and 2012.<br />
23 Al Jazeera Stream. Cyber realism versus Cyber-utopians. September 1, 2011.<br />
24 TED. Evgeny Morozv. How the Net aids dictatorships. July 2009.<br />
25 YouTube. Personal Democracy Forum. Alaa abd el Fattah: Weaving a network<br />
for change: Egypt. June 14, 2011.<br />
26 YouTube. Ars Electronica. Public Square Squared – Zeynap Tufekci – EN.<br />
September 4, 2011.
12<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CASE STUDY 1: EGYPT<br />
The Egyptian blogosphere<br />
before the Revolution<br />
Between 2002 and 2006, before the age of Facebook and Twitter,<br />
bloggers were the main online activists and “citizen journalists” in<br />
Egypt. They led the independent media and pushed the limits of press<br />
freedom by:<br />
● Breaking stories that would have otherwise been overlooked.<br />
Egyptian bloggers broke major stories on sexual harassment,<br />
election fraud (in 2005), police brutality, and the mistreatment of<br />
Sudanese refugees.<br />
● Documenting stories with unique photographic and video<br />
evidence. The Egyptian bloggers were actually active on the<br />
ground. They organized events and demonstrations and used their<br />
cameras to cover events that the traditional media would not cover.<br />
● Transmitting stories to a global audience. Blogs, unlike<br />
Facebook today, were mostly open to all viewers, with some blogs<br />
getting thousands of visitors daily, such as that of the famous blogger<br />
Wael Abbas, 27 “Al Wa’ii Al Masri,” that was getting up to 30,000 hits<br />
a day. 28<br />
● Speaking about topics that were “off limits” to the traditional<br />
Egyptian media, such as criticizing the regime or the military. By the<br />
end of 2004, movements such as “Kifaya” started to gain a following<br />
and were asking for change in the run-up to the 2005 elections.<br />
They held demonstrations that were not covered by the traditional<br />
media. Bloggers filled this gap by posting footage and photos of<br />
these events that often included police clashing with protesters.<br />
● Collaborating with both citizens and the traditional media<br />
through blogging. For example, footage showing the torture of<br />
prisoners in police stations was given to the blogger Wael Abbas.<br />
This footage, which was only published online, was used as<br />
evidence in the court trial of a police officer, who was later sentenced<br />
to three years’ imprisonment. In other cases traditional journalists<br />
used recordings and photos taken by bloggers without mentioning<br />
the source. This alliance between bloggers and traditional journalists<br />
created a new kind of journalism. 29<br />
27 http://misrdigital.blogspirit.com.<br />
28 Reporters Without Borders. Handbook for Bloggers and Cyber-Dissidents.<br />
March 2008. PP. 40-41.<br />
29 My heart’s in Accra (blog). Wael Abbas on video and social media in Egypt prior<br />
to the revolution. January 13, 2012.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 13<br />
The Egyptian government’s response<br />
● As early as 2002 the Egyptian government was wary of bloggers and<br />
set up a special intelligence unit to survey blogs.<br />
● In 2006, there was a big attack on bloggers during a protest resulting<br />
in mass arrests and up to two months’ arbitrary detention for some.<br />
In reaction, a lot of the bloggers reduced their activities and some<br />
even left Egypt.<br />
BLOGGING<br />
1<br />
How Egyptian bloggers are adapting in the age<br />
of Facebook and Twitter<br />
● Today the bloggers of the last decade are adapting. For example,<br />
Wael Abbas says that he is using new platforms, such as the microblogging<br />
tool Twitter to adapt to the times. He says Twitter allows<br />
him to cover an event in real-time by linking it to his mobile phone’s<br />
camera.<br />
● Hence, the bloggers of the new era are pushing media boundaries<br />
and competing with media giants such as Al Jazeera and the BBC,<br />
who, in the absence of access to certain places, have no choice but<br />
to depend on citizen journalists.
14<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Interviews:<br />
A snapshot of the Sudanese<br />
blogosphere<br />
A conversation with Sudanese blogger Amir<br />
Ahmad Nasr<br />
Amir Ahmad Nasr is the author of a recently published<br />
autobiography, My Isl@m: How Fundamentalism Stole My Mind –<br />
and Doubt Freed My Soul. He was one of the first Sudanese bloggers<br />
to blog in English and the most famous. The book started as a sixyear<br />
journey of anonymous blogging to unearth difficult questions<br />
about Islam, identity, the politics of the Middle East region and much<br />
more. It has a lot of references to online activism and communities of<br />
interest in the Arab and Islamic blogosphere. It is probably one of the<br />
best Sudanese documents on the impact of blogging and how it can<br />
move to collective and concrete action – albeit in a more global and<br />
regional sense – especially in closed and undemocratic societies.<br />
In Sudan we have not yet capitalized on the power of blogging like<br />
other countries with more substantial blogospheres.<br />
In this interview, Amir explains what led him to blog, why he blogged<br />
for six years, and what impact that had on his life.<br />
(The interview has been edited for brevity.)
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 15<br />
Q1. In your book, My Isl@m, you observed in 2006 that “a<br />
Sudanese blogosphere made of Sudanese bloggers speaking<br />
about Sudanese issues, was nowhere to be found.” This<br />
absence of a Sudanese blogosphere a few years ago was<br />
obviously a motivator to you. Can you tell us when and why<br />
you started blogging?<br />
I started blogging in April 2006. By complete accident I discovered<br />
this website called The Big Pharaoh. 30 After exploring it, I noticed<br />
it didn’t look like a typical website. When I looked at it and I read, I<br />
realized it was something called “a blog.”<br />
In a blog you have different posts, in sequence, from the older to<br />
the newest post. And the newest post tends to be on the top,<br />
and blog posts are arranged sequentially. Then there’s a comment<br />
section where people can write their thoughts and respond to you<br />
directly as a blogger. I was fascinated and blown away by the format<br />
and how “The Big Pharaoh” was using it to write about all sorts of<br />
controversial issues in Egypt. He was a secular and very liberal guy,<br />
and he was talking about sex, God, politics, women’s rights, Islam<br />
and atheism. Things that were really provocative, and that people<br />
wouldn’t dare talk about openly.<br />
I was intrigued because I had a lot of questions growing up that I was<br />
too scared to confront and to answer. Questions about the nature<br />
of religion and the nature of God. About the Quran and whether it is<br />
really the word of God. And “The Big Pharaoh” was tackling these<br />
questions openly, so I became obsessed. In his blogs he linked<br />
to other blogs, including Iraqi blogs and Palestinian blogs, Saudi<br />
and Algerian. They were all talking about the different issues that<br />
they confronted in their countries. The Iraqi blogosphere during the<br />
American-led invasion of Iraq was very active and the conversation<br />
was very heated.<br />
Darfur was a horrendous tragedy in 2006-2007, and I asked myself:<br />
“Egyptians are talking about Egyptian issues and others are talking<br />
about their issues. Where are the Sudanese bloggers?” There were<br />
other [English-language] blogs, but they were also authored by non-<br />
Sudanese. So I asked “Big Pharaoh,” and he told me, “as far as<br />
I know I’ve never come across a Sudanese blog in English, by a<br />
Sudanese. Why don’t you be the first one?”<br />
My reaction was: I don’t have much to say, I wasn’t an expert on<br />
politics, I didn’t have much knowledge. His response to me was:<br />
“Tell stories.” So I began writing about Darfur and educating myself,<br />
and through this process I learned a lot.<br />
BLOGGING<br />
1<br />
30 http://bigpharaoh.org.
16<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Q2. In your view how has the Sudanese blogosphere evolved<br />
since then?<br />
In April 2006 there was no Sudanese blogosphere. I went to online<br />
forums like “Shamarat” and “Sudan.net,” and I tried to get people<br />
who were posting actively in those forums to blog. I told them that<br />
writing in these forums limits them to the Sudanese audience that<br />
visits the forums but, when it comes to the rest of the world, no<br />
one is seeing what they have to say. Blogging is a more powerful<br />
medium. When you blog, you have complete control to say whatever<br />
you want. There is no administrator who can kick you out, ban you<br />
or delete your stuff. You have sovereignty on that medium and it’s<br />
open to the world and people can engage with you. I succeeded to<br />
recruit a few who in turn recruited others. And we began having a<br />
small active Sudanese blogosphere.<br />
Between 2006 and 2009, I was the only one blogging very actively.<br />
Many of the others had to stop blogging and became inactive. I will<br />
definitely give credit to Reem, who had a blog with the tagline “I have<br />
no tribe, I’m Sudanese,” and her blog remained active, along with a<br />
few others. 31<br />
The biggest challenge was that many people were not active.<br />
Thankfully that changed. As more people joined, more blogs started<br />
and I became less active by 2011. But unlike before, when we<br />
had a Sudanese blogosphere, the bloggers were not interacting<br />
together and networking, engaging and discussing, because now<br />
the conversation shifted to Twitter and Facebook.<br />
In a sense that was a positive development, because the good<br />
thing about Facebook is that you don’t need to build an audience.<br />
Sudanese bloggers abandoned blogging because, when you blog,<br />
you don’t just blog, you have to market your post and you have to<br />
engage others to read what you have to say. And if no one is reading<br />
what you’re writing, then you lose motivation. While on Facebook,<br />
your friends and their friends are the audience.<br />
Unfortunately, on Facebook, and even more on Twitter, you are not<br />
able to discuss much when you have 140 characters. It’s not the<br />
same as writing a coherent, well-thought-out article that’s 1000<br />
words long. You just write a short post on your [Facebook] status<br />
update that is 200-300 words, and people like it and comment;<br />
that is it. But are we really having a deep, important, intellectual<br />
conversation? The blogosphere was excellent for that because you<br />
would write long arguments, and elaborate on your point.<br />
I was lucky to build an audience that was active, and who read my<br />
writings even when it was a long post. There are pros and cons.<br />
Right now there are more Sudanese bloggers, but they are not as<br />
31 http://www.wholeheartedly-sudaniya.blogspot.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 17<br />
tightly knit. The conversation isn’t really happening amongst them.<br />
They are not discussing things together; they are not having a good<br />
debate. The conversation is on Facebook. And it’s in the form of<br />
short comments. Which is not a bad thing, but again it does not<br />
allow you to discuss a topic in depth.<br />
Q3. You describe your relationship with blogging as: “A quest<br />
to learn and unlearn. To blog and to grow.” How did this<br />
journey of learning and unlearning go? What were the ups<br />
and downs? What were the highlights?<br />
The positive thing that comes with “unlearning” is that unlearning<br />
involves questioning and rejecting what doesn’t make sense. I think<br />
unlearning is a lot more important than learning. Because if you learn,<br />
and what you already know or what you think you know is flawed,<br />
then what you learn is going to be built on top of a foundation that<br />
is messed up, tainted, toxic and full of lies. The upside to that is that<br />
you get to discard a lot of nonsense, lies, propaganda, dogma, and<br />
indoctrination; and that is extremely liberating. It makes you a more<br />
enlightened person.<br />
The downside is that this is a painful and messy process sometimes.<br />
Especially when you are unlearning, questioning and rejecting things<br />
that are considered taboo. I happily and openly state in this interview<br />
right now that I consider myself mostly a non-believing Muslim.<br />
Meaning I don’t believe dogmatically in the doctrines that we’re<br />
supposed to believe in. That comes as part of the questioning, the<br />
unlearning and the rejection of the things that don’t make sense.<br />
I have my own spiritual practice. I consider myself a Sufi-oriented<br />
Muslim. It’s a spirituality of mine, and it’s a cultural identity.<br />
BLOGGING<br />
1<br />
Q4. When describing the Arab blogosphere you say in the<br />
book that “an intellectual revolution was happening in the<br />
Arab blogosphere,” and that “Arab dissidents and political<br />
‘heretics’ of all stripes were discovering one another online<br />
and slowly forming a massive self-organized network.”<br />
Can you elaborate on how those online interactions were<br />
transforming into concrete networks in real life offline?<br />
With blogging what happens is that you begin to realize: “I’m not<br />
the only one with radical ideas. I’m not the only one asking these<br />
questions”. When you realize that there are many people all over<br />
the world who have similar backgrounds like you, and who have<br />
been asking these questions, and have been in pain and they<br />
have struggled, you feel a sense of kinship with these individuals.<br />
So you begin to email each other, and to network and have Skype<br />
conversations and chats. You begin to bond.
18<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
In many cases the bonding happens over anonymous email<br />
addresses – you want to be anonymous because you don’t trust<br />
the other person. But after a while you realize that you can trust<br />
this person. Then you reveal your real name, people find out who<br />
you are, then you become friends in real life. You then form a<br />
network, and organizations step in because they want to facilitate<br />
the discussion in real life. They create conferences where they invite<br />
you and the bloggers so that the conversation that happens online<br />
is taken offline. You meet people for the first time face-to-face, but<br />
you feel like you’ve known each other forever. There’s a real sense<br />
of camaraderie.<br />
There’s a gathering that I wrote about in my book. It was a gathering<br />
in Beirut in 2009, the second Arab Bloggers summit, and it was<br />
amazing. That network was crucial during the Arab uprisings<br />
because there was already a lot of trust among the people. Can<br />
a similar scenario unfold now? Unfortunately I don’t think it would<br />
be that easy because these networks are powerful and in some<br />
cases have been infiltrated. Even with the events that happen now,<br />
governments are aware of the power of digital media and digital<br />
activism. So it is not as easy to trust new names and new faces that<br />
are parts of these movements. Even in my own personal life, my<br />
circle of trusted friends remains with people that I have known from<br />
the old days.<br />
Q5. Finally, you blogged anonymously for six years. Why did<br />
you choose to do that? Can you speak about the virtues of<br />
anonymous blogging and what it can offer bloggers in nondemocratic<br />
settings or where freedom of expression is under<br />
attack?<br />
There has been a big debate over the past years about anonymity.<br />
Google, for example, has a policy where it wants you to use your<br />
real name. Facebook demands that you use your real name. Some<br />
people have been fighting that, saying they should make exceptions<br />
for people who live under regimes that are oppressive. I absolutely<br />
support that. My friend Jillian York, with the Electronic Frontier<br />
Foundation, she has been pushing for that. 32<br />
I believe in the virtue of anonymous blogging. Anonymous blogging<br />
can be abused, for sure. You can slander people, you can insult<br />
them, you can defame them, and that’s bad. But the negative side<br />
does not outweigh the positives of anonymous blogging, because<br />
when you’re anonymous you’re able to write provocatively, honestly,<br />
frankly, and in a blunt and straightforward manner about topics that<br />
need to be robustly discussed. In many countries around the world<br />
one cannot do that with one’s real name.<br />
32 https://www.eff.org.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 19<br />
In my case I said what I said anonymously because I was afraid of the<br />
repercussions. The beauty of anonymous blogging is that (and I’ve<br />
seen people go through this transformation) you blog anonymously<br />
and you’re afraid, then you develop a sense of conviction, then you<br />
realize that you don’t like being anonymous anymore. Which is why<br />
I made that conscious decision to reveal my identity during the Arab<br />
uprisings in 2011. I had friends in Tahrir Square in Egypt, and friends<br />
who went to Libya who risked their lives, and I am going to worry<br />
about anonymity?<br />
Was [revealing my identity] a beautiful event that had no<br />
consequences? No, because after I revealed my identity I got into<br />
certain issues and I had challenges. I will not elaborate on what they<br />
are, but it came at a cost. Was it worth it? I still say absolutely! But<br />
it does not mean that I am discarding the virtues of anonymous<br />
blogging. It is here to stay and it is absolutely important, and I think<br />
Facebook and Google should seriously reconsider their position on<br />
this matter.<br />
BLOGGING<br />
1<br />
Additional reading on Amir Ahmad Nasr<br />
● Amir’s blog. 33<br />
● Book review on Amir’s book My Isl@m. 34<br />
33 http://www.amirahmadnasr.com/blog.<br />
34 Foreign Policy Magazine. Dalia Haj-Omar. A Frank Debate about Identity and<br />
Islam. July 30, 2013.
20<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Reflecting on Sudan’s contemporary<br />
blogosphere with Omnia Shawkat<br />
Omnia Shawkat is a young Sudanese and global citizen. She<br />
is an avid commentator on Sudanese current affairs and is<br />
interested in learning and sharing an intergenerational perspective<br />
of Sudanese culture. During 2012 and 2013 Omnia did an on-theground<br />
exploration of the Sudanese cultural scene that was then<br />
complemented by a survey of Sudanese blogs to study whether the<br />
richness of Sudan’s cultural diversity was justly reflected online. In<br />
this interview she tells us about her findings.<br />
Q1. You have been doing a survey of active Sudanese bloggers<br />
in 2013. What general trends do you see in terms of topics<br />
and themes that are addressed (social, cultural, religious,<br />
political, etc.)?<br />
I found there is a lot of poetry and political analysis. In both we see<br />
that the identity matter is reflected in all the writings, no matter what<br />
the topic is. The themes are usually about belonging [as] there is a<br />
lot of diaspora writing from all parts of the world. But even Sudanese<br />
who are blogging [from Sudan] are writing about their own belonging<br />
and their own culture.<br />
Q2. How big or small is the Sudanese blogosphere, and are<br />
the majority blogging from inside Sudan or outside?<br />
Almost half are in Sudan and half are outside Sudan. So far I have<br />
come across 33 or 34 blogs that are either political or poetic, or<br />
creative writing and short stories. A lot of them are people reflecting<br />
on topics that are of relevance to them, with the topic of Sudanese<br />
culture as the backdrop.<br />
Q3. In terms of the on-the-ground cultural scene, can you<br />
tell us a bit about what’s happening and the kind of activities<br />
as well as the restrictions? Also, is that cultural scene justly<br />
reflected online?<br />
There are a lot of perspectives on that, so let us take it step by<br />
step. First there is a scene that is targeting the senior audience.<br />
It attracts Sudanese and non-Sudanese and it is mostly for the<br />
older generation. That [scene] is more about songs and fine art,<br />
but it’s also about social issues, and they tend to have fundraisers<br />
associated with that. It’s been going on for years at the Rashid Diab<br />
Arts Center for example – it is the most frequent one. The audience<br />
you see there is quite diverse. You see all types of people but they<br />
are mostly from the older generation. 35<br />
35 http://www.rashiddiabartscentre.net/indexen.php.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 21<br />
The younger generation have a more restricted medium to work<br />
with because they don’t have the same type of sponsorship or<br />
the diplomatic relations that someone like Dr. Rashid Diab has.<br />
Their events tend to have a more secretive veil. The networking<br />
that happens to advertise their events is very small. You won’t find<br />
posters for their events on bridges and in universities and places<br />
like that. It would be within a certain network, let’s say a Facebook<br />
page or a mailing list. The audience is vibrant. It’s Sudanese who<br />
have been in Sudan all their lives as well as Sudanese who have<br />
lived outside of Sudan, and it’s a nice mix of Sudanese from one<br />
generation. They are mostly tech savvy, which is how they get to<br />
know about these events. One of these examples would be Nas with<br />
Notepads and before that open mic events. 36<br />
BLOGGING<br />
1<br />
The third scene that I saw was more of an international scene. It<br />
is diplomats or expats who have cultural events or openings at art<br />
galleries. It attracts Sudanese who have access to that scene. But<br />
it’s a reflection of Sudanese culture through their eyes/perspective.<br />
In terms of restrictions there are definitely a lot of restrictions,<br />
especially for the youth scene, but also for Dr. Rashid Diab. I interned<br />
for him for a while, and I remember sitting at the office and seeing<br />
that they had a lot of issues with permits, especially now compared<br />
to 2010. The permits are a bit more restricted now and they have to<br />
go through the security offices. Fundraising has also been a problem.<br />
But the youth scene is a lot more restricted. They are always worried<br />
about raids and infiltration by [State security] agents who can shut<br />
down an event on the spot (which happened with open mic events).<br />
This is an aspect that they have learned to adapt to from their open<br />
mic experience. The events have become a lot more secretive and a<br />
lot more exclusive. So there are ways that people are adapting, but<br />
it is restricting the movement and restricting the audience. It made<br />
culture become more “zoned” – so you have zones and “hot spots”<br />
where culture is and other places where you can’t find that access.<br />
I don’t know about other States [outside Khartoum] unfortunately,<br />
but I know that Port Sudan, for example, has a big cultural festival.<br />
We have a big music industry. If you turn on the Sudan television<br />
or any of the other networks you’ll find that there’s always singing.<br />
Whether it’s religious singing, or Madeeh, or normal folklore singing,<br />
and all kinds of music. But we don’t have an industry per se. You<br />
would find private parties would hire a singer, but we don’t have<br />
festivals. You don’t hear about Sudanese singers making it regionally<br />
or internationally. There are people like Mosno; 37 and Nile, who<br />
is based in Dubai. But they made it on their own, and there’s no<br />
36 http://naswithnotepads.com.<br />
37 500words Magazine. Omnia Shawkat and Ahmad Salah. On Mosno Al-<br />
Moseeki’s Fairy Tale Novella. May 15, 2014.
22<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
movement in Sudan that can propel them further. The ones that<br />
make it in Sudan, like Taha Suliman, are very popular but there’s<br />
not that much of a scene outside of the weddings and the shows<br />
that he does. There’s a few of these concerts, like Igd Algalad and<br />
such, which you can find posters for publicly and they appeal to a<br />
wider audience. But they have been around for decades; that’s why<br />
people know them and love them and they go to them.<br />
Q4. In a country where freedom of expression and association<br />
are under attack, is the Sudanese blogosphere coalescing into<br />
a safe haven for communities of interest? In other words, is it<br />
allowing discussion of topics that are off-limits otherwise? Is<br />
it allowing communities of interest to form online?<br />
Absolutely. Not only are people allowed to talk about politics, which<br />
is something that they might not have the ability to speak of in a<br />
public setting, but Sudanese outside of Sudan and Sudanese inside<br />
of Sudan are finally meeting to talk about shared interests. Also<br />
internet penetration in Sudan is high, especially for mobile phones,<br />
so you have Facebook and Twitter. People are on these devices,<br />
connected to other people talking about topics of interest.<br />
But I also think that, because we don’t have a big publishing<br />
industry, poets for example (they don’t have topics that they can’t<br />
address publicly) have created names for themselves online. If they<br />
try to publish their work offline it would be very difficult because there<br />
are a lot of restrictions on publishing houses and there are not a<br />
lot of funds going to that industry. So they navigated through this<br />
challenge and found an online haven that can provide for them and<br />
they could have a network to publicize their work. They can grow<br />
and even form interest groups where they give each other coaching<br />
lessons or creative writing lessons and workshops, which is actually<br />
happening.<br />
Can you give us examples of these platforms and such<br />
writers?<br />
NubianQ has a blog and she is a brilliant writer. 38 She is a short<br />
story writer but also writes poetry. You’ve got someone like Jogs<br />
of a Pen (@Shahdinator on Twitter), which is a brilliant poetry blog<br />
that has been there for years and has beautiful pieces. 39 But also on<br />
Twitter, for example, the “Jogs of a Pen” author with another author/<br />
blogger called Halloya (@Hallaloyaa), they often go into freestyling<br />
battles with each other by writing [poetry] lines to each other. Some<br />
of these people online I see at offline events, like with the Nas with<br />
Notepads events, where I see some of the people online share their<br />
38 http://nubianq.com.<br />
39 http://jogsofapen.blogspot.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 23<br />
poetry with a very exclusive [crowd]. But at least it’s there for people<br />
who don’t see it online.<br />
Q5. Are Sudanese bloggers mostly anonymous or not?<br />
Do they feel safe to express themselves online? Are there<br />
advantages to anonymous blogging in an unfree country like<br />
Sudan? Are there disadvantages?<br />
It’s interesting because I would think political writers would go<br />
anonymously, and creative writers would not. But it’s actually the<br />
opposite; it’s creative writers who are anonymous. And you have<br />
political writers, like Maha Elsanosi whose blog is Mimzology; 40 you<br />
have Reem Shawkat whose blog is Wholeheartedly Sudaniya; 41 you<br />
have “Sudanese Thinker” who is out now (he had been anonymous<br />
for some time) whose name is Amir Ahmad Nasr. 42 You have<br />
someone like Yasir Dahawy … There’s a huge generational gap in<br />
terms of expression. We are a very oral society. People are talking<br />
about politics at every social event, but not a lot of people sit down<br />
and write their thoughts in a logical sequence and share their<br />
thoughts in printed form.<br />
There is a huge crackdown on printed media [by the State] and<br />
young people don’t feel that interested in print media, because those<br />
who read print media are not our generation. So the youth are trying<br />
to compensate for that gap [online]; and they are doing it bravely<br />
without having to do it anonymously.<br />
BLOGGING<br />
1<br />
Q6. What have some of the prominent bloggers achieved?<br />
Mimzology and Wholeheartedly Sudaniya won blogger awards<br />
consecutively in 2011 and 2012; and Amir Ahmad Nasr published<br />
a book. Bloggers are pretty supportive of each other and publicize<br />
each other’s work. They are finding ground to connect without having<br />
to ever meet. And they are forming networks online and offline. It’s<br />
difficult to generalize, but it seems like a very buzzing scene.<br />
Q7. Finally, how do you respond to those who say, “Why do I<br />
need a blog in the age of Facebook and Twitter?”<br />
A lot of people on Facebook and Twitter have random thoughts that<br />
they are constantly injecting to their timelines or statuses. The blog<br />
is an eloquent form of writing; you have to put your thoughts in a<br />
logical sequence. It’s also a documentation of your thoughts. Blogs<br />
can be archived; they can be used for research; and they can be<br />
shared with a wider audience [more] than a status update that stays<br />
on the timeline for 50 seconds or a minute.<br />
40 http://mimzology.blogspot.com.<br />
41 http://wholeheartedly-sudaniya.blogspot.com.<br />
42 http://www.amirahmadnasr.com.
24<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
There is a huge audience that you can tap into on topics such<br />
as art, identity, contemporary politics and social history. This tech<br />
savvy generation is utilizing different platforms. So you don’t need<br />
a blog, unless you find that your thoughts need to be put in a blog.<br />
Otherwise you can thrive on Twitter, but I really think that the archiving<br />
of documented thoughts is the appeal of a blog.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 25<br />
Allows deep flushed-out thinking, reflection and debate<br />
Anonymous blogging<br />
To create a<br />
“counter-narrative”<br />
Why Blog?<br />
To create “alternative public spaces”<br />
BLOGGING<br />
1<br />
To centralize your presence online<br />
Why do you need a blog in the<br />
age of Twitter and Facebook?<br />
If you have read the interviews with blogger/author Amir Ahmad Nasr and<br />
cultural analyst Omnia Shawkat you should be convinced by now that<br />
blogging remains an important tool even in the age of social media. Below<br />
we have distilled their words of wisdom on why blogging still matters in the<br />
age of Facebook and Twitter.<br />
• Centralize your presence online in one place that is easily searchable<br />
and archivable. By using widgets you can display your Twitter, Facebook<br />
and other social media timelines on your website. Blogs also have more<br />
advanced searching and archiving functions, and hence are ideal for<br />
documenting and research. Facebook and Twitter pages are hard to search<br />
and therefore difficult to do research on or to retrieve older posts from.<br />
• Deep flushed-out thinking, reflection and debate, as opposed to<br />
brief status updates and comments. This can include creative writing,<br />
political analysis, photo documentary and/or video blogging.<br />
• Anonymous blogging can give you the freedom to express yourself<br />
and engage with others without fear, especially when addressing topics<br />
that are considered taboo by the authorities or society.<br />
• The creation of a “counter-narrative.” In countries where freedom<br />
of expression and association are under attack and where most of the<br />
media is State-controlled, a sizable blogosphere can challenge the<br />
dominance of State propaganda and create a counter-narrative based<br />
on the sharing of collective citizen grievances.<br />
• The creation of “alternative public spaces.” When freedom of<br />
assembly is limited, the blogosphere, just like social media platforms,<br />
offers possible spaces of assembly and discussion. Those spaces,<br />
however, are not always safe, since most governments are conducting<br />
heavy surveillance on social media platforms nowadays!
26<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Choosing a blog platform:<br />
Blogger, Wordpress and Tumblr<br />
For simplicity, the most popular (and free) blog platforms are discussed and<br />
compared below to help you decide what would work best for you. Opening<br />
a blog is as easy as opening an email account; the hard part is creating<br />
the content and keeping the blog active. The blogs discussed below are<br />
the most user-friendly. These blogs can be used without any advanced<br />
programming skills as they have many ready to use themes/templates<br />
(unless you are seeking advanced customization in the case of Wordpress<br />
and Tumblr). 43<br />
1. Blogger (also BlogSpot) 44<br />
Blogger is the easiest and fastest way to start your first blog. It has a user<br />
friendly interface and has a setup wizard that allows you to be up and running<br />
quickly. Blogger is owned by Google and is easily integrated with Google<br />
analytics to give you professional statistics on how your blog is doing.<br />
Who is this for? Beginners and casual bloggers should consider starting<br />
with Blogger. Later, if the need arises, they can move on to another platform.<br />
Its limited themes and design styles make Blogger seem less professional.<br />
2. Wordpress 45<br />
Wordpress is an extremely flexible and powerful blogging platform that<br />
can be used as a content management system for websites. There are<br />
thousands of themes and plugins that can make your blog look great<br />
and have many features. With all these choices and power comes some<br />
complexity in its setup and configuration. But once up, it is easy to use and<br />
maintain.<br />
Who is this for? This is the way to go for professional bloggers, artists,<br />
independent media outlets, civil society groups, including NGOs, and also<br />
the private sector.<br />
43 This is a useful resource with recommendations on how to set up a blog and how<br />
to write a blog: http://www.theminimalists.com/how-to-set-up-a-wordpressblog/<br />
and http://www.theminimalists.com/blog/#recommendations.<br />
44 http://www.blogger.com.<br />
45 http://wordpress.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 27<br />
3. Tumblr 46<br />
Tumblr is a form of micro-blogging that focuses less on writing and more<br />
on sharing pictures, videos and visual art content. It is easy to publish on,<br />
even through SMS and email. It also has many great looking and fun to view<br />
themes; and it works well on mobiles and tablets.<br />
Who is this for? Tumblr is great for photographers, artists, video bloggers,<br />
and as a commentary tool on other websites’ content through sharing links<br />
and embedding their content. But due to its highly visual nature, Tumblr is<br />
recommended for non-writers and mainly for sharing pictures and videos<br />
with limited text.<br />
BLOGGING<br />
1<br />
Hosted vs. self-hosted blogs<br />
Obtaining paid hosting services can be difficult and costly, specifically in<br />
countries impacted by US financial sanctions (such as Iran, Sudan, Syria,<br />
Cuba, and North Korea). However, free options for blogging are abundant.<br />
Even though the free options would not include a personalized domain<br />
name (www.yourname.com), hosted URLs are available at no charge<br />
(yourname.wordpress.com). Below is a breakdown of how to choose the<br />
right hosted solution for your blog.<br />
Hosted blogs are 100 percent free, easy to set up blogs that are hosted<br />
on the platform’s server (e.g. on Blogger, Wordpress.org or Tumblr servers).<br />
This reduces the complexity of setting up a blog, and makes the process<br />
similar to setting up a Facebook page or opening an email account.<br />
Who is this for? Individuals and/or institutions and those who do not feel<br />
like plunging into web development should start with a hosted platform.<br />
Besides the ease of use, it also welcomes you into a community that the<br />
platform provides.<br />
Companies, NGOs, professional writers and artists might need the power to<br />
design a unique tailored blog/site. For this a non-hosted or self-hosted<br />
option is the way to go.<br />
46 https://www.tumblr.com.
28<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Self-hosted means you get your own hosting or a third-party paid site.<br />
Good examples of hosting sites include bluehost.com and hostgator.com.<br />
This costs around USD 4-5 per month, and provides your own unique<br />
domain name (URL), for example www.sawtna.net. Independent hosting<br />
accounts give you total control and freedom to design and manage your<br />
blog as well as access to a customized email (e.g., yourname@yourname.<br />
com). They also allow you to easily transform your blog into a website. With<br />
that power comes added complexity and the need to have basic HTML and<br />
web-design skills. Note that it is possible to buy a domain name and then<br />
map it to your platform-hosted blog.
CHAPTER 2<br />
Twitter<br />
TWITTER<br />
2
30<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CHAPTER 2<br />
Twitter<br />
This chapter includes an introduction to the<br />
micro-blogging social media platform Twitter. The<br />
uses of Twitter and the extent of its global reach<br />
are discussed, as well as how to link Twitter to<br />
other tools, such as websites/blogs and phones/<br />
smartphones. Twitter terminologies and signs are<br />
also explained.<br />
The highlight of this chapter is an interactive presentation with detailed<br />
steps on how to organize a successful social media advocacy campaign.<br />
This includes an explanation of social media analytical tools or social<br />
media metrics and how they can be used to measure the impact of digital<br />
campaigns.<br />
Turning to practical uses, we have an interview with renowned Sudanese<br />
cartoonist Khalid Albaih, who talks about how his passion for political<br />
cartoons blossomed and the different social media tools he uses to<br />
disseminate his artwork globally.<br />
Two case studies are presented, from Iran and Sudan. We look at the Iranian<br />
“Green Revolution” and how different stakeholders (opposition parties,<br />
citizens, and international media) used social media to share information<br />
and coordinate and mobilize protests, regardless of a massive government<br />
clampdown on independent media outlets during the 2009 Iranian elections.<br />
Additionally, the debate about “Twitter revolutions” is briefly discussed.<br />
From Sudan, the campaign launched by civil society and youth movements<br />
to free the prominent Nuba Mountains female detainee Jalila Khamis is<br />
discussed in depth. We unravel the tools the Sudanese civil society used<br />
to give visibility to Jalila’s unjust detention and the proceedings of her trial.<br />
From both the Iran and Sudan case studies we extract the lessons learned<br />
– what worked and what did not work.<br />
We wrap up by discussing a few useful social media applications that can<br />
be used to enhance your experience when using Facebook, YouTube,<br />
Instagram, Flickr, Google+ and others. They include Storify, Speak to Tweet,<br />
Flipboard, and BufferApp, among others.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 31<br />
A brief introduction to Twitter<br />
Twitter is a micro-blogging platform that allows a maximum of 140 characters<br />
to be posted. This can include links to articles, images and videos.<br />
Twitter was initially designed to ask a very simple question, “What are you<br />
doing?” to provide updates between friends. This is still the case, but like<br />
any digital tool, users are expanding the uses of Twitter to new dimensions<br />
different from the original purposes for which Twitter was designed.<br />
In most cases Twitter profiles are public and conversations are also public<br />
for all to see, unless you send messages to someone’s inbox as a direct<br />
message. In this case that person must follow you too.<br />
Twitter has more than 300 million active users globally and almost 1 billion<br />
registered users. If strategically used, it can help you receive very fast<br />
updates from your community of interest. (See the infographic on the next<br />
page for more Twitter statistics. 47 )<br />
TWITTER<br />
2<br />
Why use Twitter?<br />
• To spread messages fast: for public awareness campaigns and<br />
information-sharing.<br />
• To communicate with large audiences.<br />
• To follow or cover events in “real-time.”<br />
• To crowdsource for ideas or information. 48<br />
• To fundraise for campaigns.<br />
• To engage with your followers and non-followers.<br />
47 https://about.twitter.com/company.<br />
48 Crowdsourcing is defined as using the power of the internet to reach out to<br />
and/or mobilize citizens, in other words using the power of the “crowd” to get<br />
information that is often shared for free. On Twitter you can “crowdsource” by<br />
asking your followers a question on a certain topic and showing them how and<br />
where they can provide their inputs. For more on crowdsourcing see chapters 3<br />
and 4 of this guide.
32<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
How to gain followers on Twitter<br />
Twitter allows people to follow you based on their interests and the content<br />
of your tweets. Twitter has evolved into a community of people with specific<br />
interests.<br />
On Twitter you can follow people you do not know. You can even follow<br />
celebrities (artists, writers, politicians, actors).<br />
It is a powerful ICT tool, but it requires patience to build a community of<br />
followers. To gain followers you have to gain the trust of your “community of<br />
interest” by doing the following:<br />
1. Being authentic.<br />
2. Being accurate.<br />
3. Posting frequently.<br />
Twitter in numbers (2015)<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 33<br />
Identifying influencers and new followers on<br />
Twitter<br />
Find and follow people whose Tweets interest you from the “Discover” tab on<br />
your phone Twitter application. Browse tailored recommendations on “who<br />
to follow” suggestions, find friends using your address book, or browse<br />
categories of popular accounts. Based on your interests and the people<br />
you follow, Twitter will also send you weekly suggestions of who to follow.<br />
Linking Twitter to other digital tools<br />
Twitter works best when linked to other digital tools. It should not be used in<br />
an isolated manner for advocacy campaigns. Its real power is in combining<br />
it with other social media channels, such as YouTube, your campaign or<br />
institutional Facebook page, blog and/or website and even your mobile<br />
phones!<br />
Linking Twitter to your website or blog<br />
Want to link from your website to your Twitter account?<br />
• Go to your Twitter account; then<br />
• Go to “settings;” then<br />
• Go to “widgets” and click on the button “create new.”<br />
• You will be taken to a page that says, “create a user widget.”<br />
• Here you are prompted to choose a timeline that is one of the following:<br />
your user timeline; tweets you have favored; specific lists you have<br />
created; or specific search based on a hashtag or topic. The most<br />
commonly used is the timeline, which will show all tweets you tweeted,<br />
retweeted and responded to.<br />
• When you make your choice press “create widget.”<br />
• An HTML code will appear that you will have to copy and paste in the<br />
appropriate location of your website’s source code.<br />
TWITTER<br />
2
34<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong>
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 35<br />
Linking Twitter to your phone<br />
For smartphones<br />
Given Twitter’s importance in capturing breaking news and events in realtime,<br />
it’s no surprise that up to 80 percent of Twitter users tweet from their<br />
mobile phones.<br />
To link Twitter to your smartphone simply download the Twitter application.<br />
For older generation cell phones<br />
To activate sending tweets via text messaging using an old generation cell<br />
phone (i.e., not a smartphone): 49<br />
• Go to your Twitter account (from your computer);<br />
• Go to “settings” and then “mobile;”<br />
• Indicate your “country” from the drop down menu;<br />
• Fill in your phone number;<br />
• Choose your telephone provider; and<br />
• Press the button “activate phone.”<br />
TWITTER<br />
2<br />
49 https://support.twitter.com/articles/14226-how-to-find-your-twitter-short-codeor-long-code.
36<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
If you are inside Sudan, start tweeting from your phone by sending texts to<br />
the short code 40404 (local texting fees will apply). This allows you to send<br />
and receive tweets.<br />
Note: at the time of writing this, the texting to Twitter service in Sudan, from<br />
old generation cell phones, had been discontinued by the local provider.<br />
Another option is to use long code, which allows only one-way tweeting,<br />
meaning that you cannot receive tweets. International tweeting rates may<br />
apply. The long codes are as follows:<br />
UK: +447624800379.<br />
Germany: +491724403473.<br />
Finland: +3584573950042.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 37<br />
Twitter terms and signs<br />
Twitter terms<br />
Tweet: A message of up to 140<br />
characters.<br />
Twitter feed: <strong>New</strong>s feed of Twitter<br />
messages by one user.<br />
Tweep: A Twitter user.<br />
Following: The friends, groups,<br />
organizations, campaigns, etc.,<br />
that you are following and receiving<br />
tweets from.<br />
Followers: “Fans” or friends who are<br />
following your tweets.<br />
Hashtags: Words prefixed by # that<br />
are similar to URL links; they help<br />
users interested in specific topics<br />
or keywords to find relevant tweets.<br />
They are searchable and useful for<br />
archiving conversations and as an<br />
organizational tool.<br />
<strong>New</strong>sfeed: Collection of new<br />
messages.<br />
Twitterverse: The realm of tweets<br />
and Twitterers.<br />
Popular Twitter signs<br />
@: <strong>Use</strong> this when addressing or<br />
replying to another Twitter user. Note<br />
that your conversation will be public<br />
or you will be introducing that person<br />
to others in your network.<br />
d: Signifies a direct private response.<br />
Others will not see this.<br />
#: This is a symbol for the hashtag<br />
that precedes a phrase or word as<br />
discussed under “Twitter terms.”<br />
RT: Stands for “retweet.” Comes<br />
before any tweet that you want to<br />
“retweet.”<br />
H/T: Hat tip, used for crediting<br />
another Twitterer for a thought or<br />
reference.<br />
#FF: The abbreviation for Follow<br />
Friday, an indication that you are<br />
recommending people to follow.<br />
#PT: Stands for “previous tweet” and<br />
indicates that you are writing a few<br />
related tweets.<br />
TWITTER<br />
2<br />
For more Twitter terminology visit Twittonary, an online Twitter dictionary that<br />
explains Twitter-related words: http://www.twittonary.com
38<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
How to organize a social media<br />
campaign<br />
In this section we take you through a step-by-step interactive presentation<br />
on how to organize a successful social media advocacy campaign.<br />
Below are the steps that we recommend you follow when you are planning<br />
a social media advocacy campaign:<br />
• Identify your objectives clearly so that they are SMART (specific,<br />
measurable, achievable, realistic and time-bound).<br />
• Collect or produce content to inform and educate others about your<br />
topic. This may require research to produce a report or producing a short<br />
compelling video or a collection of videos. Research all content and use<br />
it during the campaign as educational materials.<br />
• Prepare graphics such as a common profile or avatar that you want<br />
people to upload to spread the message.<br />
• <strong>Use</strong> a wide range of new-media tools and social media platforms<br />
to reach diverse audiences.<br />
To create a social media campaign through an online interactive<br />
presentation, follow the steps here: 50<br />
Prezi. Sawtna Digital. Steps for Preparing a <strong>New</strong>-media Advocacy<br />
Campaign.<br />
50 Prezi. Sawtna Digital. Steps for Preparing a <strong>New</strong>-media Advocacy Campaign.<br />
July 5, 2014.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 39<br />
• On Twitter create a hashtag that is catchy and short. Creating<br />
two hashtags in Arabic and English is important to widen the scope of<br />
the audience you are reaching. The Arabic hashtag will ensure that a<br />
Sudanese audience is part of the conversation and the English hashtag<br />
will inform an international audience, and especially the international<br />
media.<br />
• Have a media strategy. (1) Prepare Twitter handles for media outlets<br />
and organizations you want to target during the campaign (e.g., @NYT,<br />
@AJStream, @BBCArabic, @BBCWorld, @BBCAfrica, @alhurranews, @<br />
France24_Ar, @France24_en, @AlArabiya). (2) Have designated media<br />
spokespersons ready to address questions from journalists and to give<br />
media interviews upon request.<br />
• Have a team that will take shifts to tweet, engage with the public and<br />
respond to media requests.<br />
• Spread the word before you launch! Tweet heavily to bring attention<br />
to your campaign a few days beforehand. Create an announcement on<br />
your website or blog, with the essential information (what, why, where,<br />
when and how people can act), and circulate that link on multiple social<br />
media platforms.<br />
• Link your online action with on-the-ground activities and relevant<br />
partners. Make sure that you capitalize on any community outreach<br />
and/or organized events on the ground linked to the campaign’s theme,<br />
by spreading the campaign’s messages via offline activities, forums,<br />
flyers or newsletters, and partnering up with relevant groups.<br />
• Measure and evaluate impact. If you defined your objectives clearly,<br />
measuring impact will be easier. It is important to measure impact and<br />
evaluate the campaign in order to learn from successes and failures<br />
and improve future Twitter campaigns. Impact can be the short-term<br />
immediate outputs or the long-term outcomes. Some general indicators<br />
or short-term outputs could be: (1) Were you able to execute the<br />
campaign as planned? (2) Did you get any media requests, interviews<br />
and/or coverage? (3) Did the Twitter campaign generate a vibrant<br />
discussion? (4) How often was the designated hashtag tweeted and<br />
retweeted?<br />
TWITTER<br />
2
40<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Measuring impact: social media<br />
analytics and real-time tracking of<br />
online campaigns<br />
Private sector enterprises, governments and non-profits are starting to<br />
realize that their interactions on social media platforms generate a lot of<br />
useful data. This data can tell volumes about supporters, clients, investors<br />
and constituents, but only if it is centralized, organized and visualized to<br />
inform decision-making. There are many easy ways to use social media<br />
analytical tools that help with exactly that. Generally speaking, the social<br />
media metrics that can help us measure the impact of our social media<br />
strategies include: 51<br />
• Reach: number of followers and/or fans.<br />
• Engagement: number of mentions, likes, shares, tweets and retweets.<br />
• Referral traffic from website: amount of traffic coming to your website<br />
from social media and/or the top URL addresses bringing traffic into the<br />
website.<br />
• Monthly number of unique visitors and/or reads to your website<br />
and the comments generated are also important website metrics.<br />
• Share of voice: the percentage of mentions within a certain sector or<br />
profession.<br />
• Competitive score: where your competitors stand in terms of reach,<br />
engagement and share of voice.<br />
A word of caution: social media metrics can generate a lot of data/<br />
information that may not be useful to you. <strong>Social</strong> media analytics or metrics<br />
that are useful to you are those that are directly related to your end goals<br />
and objectives. Hence, feel free to discard metrics that are not useful. Also<br />
note that some metrics may be worth your attention more than others. For<br />
example, the high number of fans on your Facebook or Twitter pages may<br />
be less important than the actual number of fans who engage with you to<br />
help you spread your message by tweeting and sharing, and who respond<br />
to you through concrete action. 52<br />
51 Visual.ly. 5 <strong>Social</strong> <strong>Media</strong> Metrics That Won’t Slow You Down. June 25, 2013.<br />
52 GoodData. Marketing Metrics Overload: What Really Matters. May 6, 2013.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 41<br />
Twitter’s analytical tool<br />
Twitter has its very own analytical tool. To use it go to:<br />
• The toolbar at the top with your Twitter profile picture; then<br />
• Scroll down to “Analytics.”<br />
Through Twitter’s analytical tool you will get a detailed analysis of your Twitter<br />
account’s activity for the past 28 days that will include:<br />
• Tweets: Your total number of tweets in the last 28 days.<br />
• Tweet impressions: The total impressions or people reached (through<br />
tweets, retweets or mentions), including the percentage increase or<br />
decrease in impressions.<br />
• Profile visits: The total number of visitors to your profile, in addition to<br />
the percentage increase or decrease in profile visits.<br />
• Mentions: The number of times you received mentions.<br />
• Followers: Your total number of followers with an indication of how<br />
much that number increased or decreased.<br />
• Top tweet: The tweet that received the highest number of impressions<br />
and hence reached the highest number of people.<br />
• Top follower: Your most influential new follower; influence here is<br />
measured in terms of the number of his or her followers.<br />
TWITTER<br />
2
42<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Additional social media analytical tools<br />
Below are five social media analytic tools and a detailed discussion of what<br />
they offer.<br />
1. Topsy. 53 Topsy is a social media analytics tool that provides access to<br />
every tweet generated on Twitter, and also indexes social networks including<br />
Facebook and Google+. Topsy has created a complete searchable archive<br />
of the more than 300 billion tweets sent over Twitter since it was set up, and<br />
added other analytics tools to make itself useful to businesses – which can<br />
buy advanced services. Topsy also provides metrics for any term mentioned<br />
on Twitter via its free analytics service at analytics.topsy.com, where you can<br />
compare up to three terms for content in the past hour, day, week or month.<br />
2. TweetReach 54 and Keyhole 55 are two tools that help evaluate in great<br />
detail the impact of certain hashtags on Twitter, or the impact of a campaign<br />
or topic being discussed, by measuring: (1) the number of posts or tweets<br />
under a specific hashtag; (2) the number of users of a certain hashtag; (3) the<br />
reach or number of unique followers a user has, and hence how influential<br />
each user is; and (4) the impressions: the number of times a user posts.<br />
Keyhole works with Twitter, Instagram and Facebook; TweetReach works<br />
exclusively with Twitter. Both tools are free of charge and the analytics are<br />
tracked for 8 days at a time. They include visual data such as graphs, pie<br />
charts and histograms. However, to have more historic analytics dating back<br />
beyond 8 days, users have to upgrade to a pro-account that charges fees.<br />
Analytics by both TweetReach 56 and Keyhole 57 using the hashtag<br />
#SudanRevolts are illustrated in the screenshots below:<br />
53 http://topsy.com.<br />
54 http://tweetreach.com.<br />
55 http://keyhole.co.<br />
56 http://tweetreach.com/reports/9110423?v=2.<br />
57 http://keyhole.co/realtime/1E5x4w/SudanRevolts.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 43<br />
3. Klout 58 is a social media analytical tool that works with multiple social<br />
media platforms and ranks users’ internet influence based on the number<br />
of followers they have and how often posts are liked and retweeted. Klout<br />
defines “influence” in social media as “‘the ability to drive action’. When you<br />
share something on social media or in real life and people respond, that’s<br />
influence. The more influential you are, the higher your Klout Score.” The<br />
Klout Score ranges from 1 to 100 and is not static (this tool is free).<br />
4. ThinkUp 59 was used by the Obama administration in its beta<br />
(development) phase and is a social media analytics tool for Twitter,<br />
Facebook and Instagram that is open source and was launched in early<br />
2014. 60 It provides a group of dashboards and notification tools that tell<br />
you which tweets were your most popular, who your biggest fans are, and<br />
whether your posts tend to do better in the morning or in the afternoon,<br />
among other things. It also provides a searchable archive of your tweets<br />
and a handy way to reference responses to questions you have asked. It is<br />
not free, but it is affordable; fees range from basic membership to executive<br />
membership for companies.<br />
5. Crowdbooster 61 evaluates impact metrics and identifies users to follow.<br />
This gives in-depth analysis of public information or marketing campaigns<br />
as well as tips on how to improve outreach. This service is not free, but there<br />
is a 30-day trial period.<br />
TWITTER<br />
2<br />
58 http://klout.com/corp/how-it-works.<br />
59 https://www.thinkup.com/join.<br />
60 Wired Magazine. Klint Finley. Out in the Open: You too Can <strong>Use</strong> Obama’s Secret<br />
<strong>Social</strong> <strong>Media</strong> Weapon. October 14, 2013.<br />
61 http://crowdbooster.com.
44<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Interview with Sudanese cartoonist<br />
Khalid Albaih<br />
Khalid Albaih is best known for his political satire cartoons (dubbed<br />
Khartoons) that are one of the freshest and most talented artistic<br />
commentaries on Sudanese and Middle Eastern politics. Most are<br />
circulated on the internet and social media platforms. Khalid shot<br />
to prominence in 2011 at the height of the revolutions in the Arab<br />
world often referred to as the “Arab Spring.” His political cartoons<br />
resonated with protesters in Tahrir Square, predicted the evolution of<br />
the protest movement in the region and thoroughly followed events in<br />
the region, including in his native Sudan. To reach a global audience<br />
Khalid mainly used social media platforms such as Facebook,<br />
Twitter, 62 Tumblr, Flickr and Instagram. In this interview he talks to us<br />
about his journey and the power of social media in enabling artists<br />
with a social justice message.<br />
You can see Khalid Albaih’s cartoons on:<br />
● Facebook. 63<br />
● Flickr. 64<br />
● Instagram. 65<br />
● Tumblr. 66<br />
62 https://twitter.com/khalidalbaih.<br />
63 https://www.facebook.com/KhalidAlbaih.<br />
64 http://www.flickr.com/photos/khalidalbaih.<br />
65 http://instagram.com/khalidalbaih.<br />
66 http://khartoon.tumblr.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 45<br />
Q1. How did your passion for cartoons start? And how did it<br />
evolve to political cartoons?<br />
I was into art. I liked drawing ever since I was a kid. I remember<br />
tracing newspapers. And I was always into comics, and was reading<br />
comic books in Sudan when I first started to read in Arabic and<br />
English. There were all these comic books translated in Lebanon. I<br />
loved that, and I always wanted to be an artist.<br />
When we had to leave Sudan and come to Doha, my father used<br />
to buy two Egyptian cartoon-based magazines. One of them was<br />
Sabah El Kheir 67 and the other Rose al Youssef; 68 they are both very<br />
well-known Egyptian magazines. I loved cartoons. My dad would<br />
spend hours reading the magazine, and I couldn’t wait for him to<br />
finish it so I could take it and copy all the cartoons.<br />
Of course, like all the Sudanese “refugees” or diaspora, we all come<br />
from political backgrounds, with educated parents. My father was<br />
a diplomat, and when the revolution happened [in 1985], he had to<br />
leave like a lot of people, including my uncle who was a president<br />
at some point. So we come from a very political family. Growing up<br />
I heard a lot about Communists and Islamists; and al ingaz and Al<br />
Bashir.<br />
I loved cartoons, and how they put everything in a nutshell, with<br />
different styles, and they look amazing. Even if you are not into politics,<br />
it’s the first thing that you turn to see. If you read a daily newspaper<br />
you see the cartoon, and it’s probably relative to what society is<br />
going through at that time. I love the idea of it because most of my<br />
friends and the people I knew from my generation never really liked<br />
politics. Not that they didn’t like it, but they were told by their parents<br />
to keep away from it. Because, you know, “it’s very dangerous to be<br />
involved in politics, and it will stand in the way of your future to be an<br />
engineer or a doctor.” As you have to be of course!<br />
So [cartoons] was always the way to introduce the people around<br />
me to politics in a very fun and short way.<br />
People don’t read anymore; they went from reading books in my<br />
father’s generation to reading magazines, and now to just reading<br />
posts on Facebook and one-liners on Twitter. Now it’s even worse,<br />
they just want to see images on Instagram.<br />
The first political cartoon I did was during the student union elections<br />
in my university. I was at the meeting and every speaker was saying<br />
what the one before him said; it was the same thing ... they were all<br />
lying basically. So I used it for a cartoon and everyone loved it. And<br />
it went on from there.<br />
TWITTER<br />
2<br />
67 https://www.pinterest.com/pin/365284219745980492.<br />
68 http://www.rosa-magazine.com.
46<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
I wanted to become a professional cartoonist/artist, but of course<br />
being from the region you had to be an engineer or a doctor. So<br />
I studied interior design engineering because it had the word<br />
engineering in it.<br />
I came here [to Qatar], and started applying to newspapers. I<br />
had a job, but really wanted my cartoons to be published. In the<br />
cartoonists’ world, for your cartoons to be published, you have to<br />
be published, which doesn’t even make sense. I started applying<br />
everywhere, but nobody wanted my cartoons because, first of all, I<br />
didn’t have the name to put out such political stuff.<br />
Secondly, my cartoons looked different. And all the editors I was<br />
talking to were really old and had no connection to the youth. They<br />
had no idea what a computer was and were always sitting on huge<br />
desks with not one computer in sight, and big piles of paper.<br />
That was around the time the Arab Spring started and I was very<br />
upset. Bouazizi burned himself and I started a Facebook page. It<br />
was the same reaction we had all over the Arab world, and we had<br />
no choice but to be online, because it was the only place to speak<br />
freely and be understood by people your age from different regions. I<br />
started a Facebook page (to put my work on it), and with the help of<br />
my colleagues, word started getting around. When the Arab Spring<br />
happened, I started doing work about Tunisia, Egypt and then Libya<br />
– and it just spread.<br />
A lot of activists and civil rights movements used my work. And<br />
because it is free online, under a creative commons license, it really<br />
got a lot of views and got used in a lot spaces.<br />
Q2. Tell us about the moment you realized your cartoons have<br />
a regional or global audience beyond your native Sudan.<br />
There were a couple of moments. The first one is when I was<br />
contacted by a journalist in Brazil asking me if they could use my<br />
work because they saw it online. To me that was amazing. The<br />
biggest moment was when one of my friends stenciled my cartoon in<br />
Lebanon. Then, a day after, someone stenciled my cartoon in Tahrir<br />
Square, during the Egyptian revolution, three days before Mubarak<br />
stepped down. I remember doing the cartoon on Friday morning<br />
and by Friday night it had a lot of views and was shared widely – it<br />
went viral. When I got an image of my cartoon being used in Tahrir<br />
Square, I felt like I was part of the revolution.<br />
During that time, there was a lot of unity among the youth and<br />
everybody was cheering; the change has finally arrived. There were<br />
no borders as we were all brothers and all supporting each other. I<br />
thought it was amazing that I was part of that time and part of that<br />
narrative.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 47<br />
It was a cartoon called “Musir” 69 and it had Mubarak’s face with the<br />
word “musir” written next to it. “Musir” in Arabic is written with the<br />
same letters that are used for “Masr,” which is the Arabic name for<br />
Egypt, but with different vowel marks. It translates to “determined” or<br />
“insisting.” This was three days before Mubarak stepped down, so it<br />
implied that he was insisting to stay.<br />
Q3. Your cartoons and your message would not have reached<br />
a global audience if not for your strategic use of ICTs. Can you<br />
tell us how you specifically used social media to expand your<br />
reach as an artist and cartoonist?<br />
When I first started posting my cartoons I posted them on Hi5 ... it<br />
was the introduction to social networking for us. After that Facebook<br />
started getting popular, and I was already on Facebook. Before my<br />
official page 70 I started posting on my personal page, 71 and people<br />
liked them. At the beginning of the Arab Spring I was interested<br />
in Twitter because I read a lot of news and “Twitter feeds” were<br />
mentioned a lot since Tunisians were using Twitter a lot. Like most<br />
people I had an account but I wasn’t using it. Then I starting using<br />
my Twitter 72 account and little by little I started to like it.<br />
TWITTER<br />
2<br />
The reason I specifically liked Twitter among all the social media tools<br />
was the one-to-one dialogue. It didn’t matter who the person was,<br />
you could communicate with them personally – you could speak<br />
to the journalists, you could speak to the newspapers, you could<br />
speak to the magazines, you could speak to whoever is running<br />
that account. In general that is what marketing 2.0 is all about, the<br />
emotional one-to-one connection. That is where I get a lot of advice<br />
on my cartoons. People write comments and I always read the<br />
comments and reply back. You see the dialogue among people as<br />
well. Some people with, some people against, as well as those who<br />
say it will never work out. I am always excited to see the comments.<br />
I then started to use Tumblr. 73 I tried to follow the trends and go to<br />
where the people are, because this is what you have to do now<br />
[in order to make it]. However it is extremely hard to be exclusively<br />
online, because you are at the mercy of the scroll of the thumb,<br />
because people usually view these things on their phones. There<br />
is a lot of junk on the internet, but there is also a lot of amazing<br />
things, so I try to make my cartoons as visually pleasing as possible.<br />
I know that I have five seconds to grab that person’s attention and<br />
tell them about the message that I want to give. I try to make the<br />
69 Flickr. Khalid Albaih. Museer Graph. February 2, 2011.<br />
70 https://www.facebook.com/KhalidAlbaih.<br />
71 https://www.facebook.com/albaih.<br />
72 https://twitter.com/khalidalbaih.<br />
73 http://khartoon.tumblr.com.
48<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
cartoons simple and I try to get the [complete] message through in<br />
five seconds.<br />
Q4. It seems that you’re saying that there is not one social<br />
media tool that works best, and that a combination is the best<br />
way to reach a diverse group or audience.<br />
Exactly. Look at the Chinese now. They are using WeChat 74 instead<br />
of WhatsApp, 75 and now they are switching to Kik. 76 It’s all about<br />
these new things that are happening, and it’s all about what’s in<br />
fashion now – what are most people using? What are the young<br />
people using? What are the professional people using?<br />
Q5. What advice would you give someone to convince them<br />
to try Twitter, for example?<br />
It took people about five years to get used to Facebook and<br />
understand what it is. As I said it’s all about what’s in fashion right<br />
now. For the average person there is no fun in using Twitter. For<br />
journalists and activists I would suggest to them opening a Twitter<br />
account because that is where all the other activists and journalists<br />
are. This is where you become a citizen journalist, and this is where<br />
your views are seen. You’re trying to reflect what is going on in your<br />
country and this is the best way to do it right now. If you are an artist<br />
or an activist and you want to get your work out there, this is the<br />
best route.<br />
Q6. What about Tumblr? A lot of people blog but fewer people<br />
are familiar with Tumblr because it is something, as you said,<br />
fashionable with the artistic community.<br />
I personally love Tumblr. If I am not in the mood for politics, Tumblr is<br />
more fun for me because it is very creative. There are a lot of artists<br />
on Tumblr and there is an award now for artists on it.<br />
It’s a blogging platform, mostly used by visual artists. It is hands<br />
down the easiest way to make a blog. You just register and you can<br />
have a blog in your name, and you can reblog from anywhere. You<br />
get to follow a lot of people and they follow you back, and there are<br />
a lot of creative people on it.<br />
74 http://www.wechat.com/en.<br />
75 http://www.whatsapp.com.<br />
76 http://kik.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 49<br />
interest graph<br />
a community based<br />
on interests<br />
social graph<br />
a community based on<br />
personal relationships<br />
allows<br />
one-way<br />
following<br />
based on<br />
two-way<br />
friending<br />
private<br />
public<br />
by default<br />
Why do I need Twitter if I have Facebook?<br />
The interest graph vs. the social graph<br />
Many of you might be thinking, “Why should I bother with Twitter when I<br />
have Facebook?” Here we will tell you why, and point out the differences<br />
between Twitter and Facebook.<br />
Although Facebook in the last few years has copied some features from<br />
Twitter, such as allowing the use of hashtags and introducing a “follow”<br />
button, where you can follow those who are not your “friends,” Twitter still<br />
remains fundamentally different from Facebook.<br />
The main difference is that Twitter is about building a “community of interest”<br />
(what is referred to as the interest graph), as opposed to maintaining contact<br />
with an existing community of friends, family and acquaintances (the social<br />
graph or a detailed map of personal relationships). 77<br />
TWITTER<br />
2<br />
Digging deeper, Twitter’s interest graph: 78<br />
• Allows one-way following as opposed to two-way friending. You can<br />
follow and interact with anyone, be it a journalist, a politician or a celebrity.<br />
• Builds a network around shared interests and not personal<br />
relationships. You can have many areas of interest.<br />
• Is public by default not automatically private. Tweets are public<br />
unless they are sent to someone’s inbox, in which case that person has<br />
to follow you back.<br />
• Is about what you want to be and not what you were.<br />
This makes Twitter ideal for advocacy because it is possible to get the<br />
attention of international journalists, TV stations and global communities who<br />
care about the same issues, as long as credible content and information are<br />
communicated to get their attention and build their trust.<br />
77 http://en.wikipedia.org/wiki/<strong>Social</strong>_graph.<br />
78 http://techcrunch.com/2010/10/16/why-twitter-is-massively-undervaluedcompared-to-facebook.
50<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
A supporter of defeated Iranian presidential candidate Mir<br />
Hossein Mousavi during riots in Tehran on June 13, 2009.<br />
CASE STUDY 2: IRAN<br />
Citizen journalism during Iran’s<br />
“Green Revolution”<br />
If there was one event that forecasted the Arab Spring, then it must<br />
have been Iran’s “Green Revolution” in 2009. This case study looks at<br />
the Iranian “Green Revolution” and the use of Twitter, Facebook and<br />
YouTube to share a national struggle (within a very closed country) with<br />
an international audience. We will analyze how different digital tools<br />
were used by the political opposition and by Iranian citizens; then we<br />
delve into the debate surrounding “Twitter revolutions.”<br />
It is noteworthy to mention that Iranians had been defying their regime<br />
for many years before this event. As of 2008, the Iranian blogosphere<br />
was the fourth largest blogosphere in the world with almost 60,000<br />
regularly updated blogs. The Iranian blogosphere included the presence<br />
of both the conservative and the more liberal and secular political<br />
activists, who were using blogging as a way to counter the extremely
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 51<br />
repressed local media and the limited freedom of speech. 79 The Iranian<br />
“Green Revolution” was hence mostly characterized by: 80<br />
● A rigged national election that generated public outrage.<br />
● The absence of international media who were kicked out by the<br />
regime before the riots.<br />
● Massive “marches” or protests in all of Iran’s main cities. The first three<br />
or four protests were peaceful and very symbolic with supporters of<br />
opposition leader Mousavi wearing green. Some estimates of the<br />
June 16, 2009 demonstration in Tehran say that seven million people<br />
showed up (almost half of Tehran’s population).<br />
● To stop the spread of protests the government arrested the<br />
opposition and targeted civilians.<br />
● Regardless of all, the world and international media outlets got<br />
detailed and up-to-date footage covering the protests and the<br />
violence that followed.<br />
<strong>Social</strong> media tools were used for different purposes by the Iranian<br />
opposition parties and by Iranian citizens.<br />
● Opposition leaders used both Facebook and Twitter in a centralized<br />
fashion as an organizing tool, to announce the time and location<br />
of protests and coordinate the movements of their supporters. But<br />
word of mouth and mobile SMS were also used by supporters to<br />
spread the word. Mousavi had more than 65,000 supporters in his<br />
Facebook group and every message reached this army of people<br />
directly. Supporters were also asked to pass the message to others,<br />
implying that the political leaders deliberately made use of their<br />
supporters’ online and offline personal networks.<br />
● Citizens used mostly their mobile phones to take pictures that were<br />
then transmitted to the world via YouTube, Twitter and Facebook.<br />
(See some images here: http://bo.st/fdUMm. 81 ) Iranians used Twitter<br />
as an important broadcast (rather than organizing) tool to report<br />
events, slogans, and minute-by-minute protest movements – that<br />
covered events in real-time. In this way, the strategic use of<br />
digital tools by Iranian citizens turned a local struggle into a national<br />
and international one.<br />
● The international media used the same videos provided by citizens<br />
in their coverage of Iran. A journalist from the BBC (the network was<br />
banned from Iran) commented on the inflow of information coming<br />
TWITTER<br />
2<br />
79 Bruce Etling and John Kelly. Mapping Iran’s Online Public: Politics and Culture<br />
in the Persian Blogosphere. Berkman Center for Internet and Society at Harvard<br />
University. April 2008. PP. 2 and 5.<br />
80 Sudan Tribune. Dalia Haj-Omar. What can Sudan learn from Iran’s Green Revolution?<br />
June 29, 2009.<br />
81 http://bo.st/fdUMm.
52<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
● from Iranian citizens by saying, “the days when regimes can control<br />
the flow of information are over.”<br />
Another lesson to take away from the Iranian experience is that it is<br />
usually the use of several digital tools and not the reliance on one or two<br />
tools that works best to get the word out.<br />
The debate around “Twitter revolutions:” Is digital<br />
activism enough to make revolutions happen?<br />
After the Iranian “Green Revolution” of June 2009, the term “Twitter<br />
revolution” was coined to describe what happened in Iran. 82 While the<br />
inventors of Twitter might have been happy for the positive press they<br />
got for enabling and empowering this national protest that captured<br />
the world’s imagination (because it initially lacked violence and was<br />
happening in one of the most repressive countries), social movement<br />
theorists and internet sociologists were quick to point out that social<br />
media are just tools and that calling them catalysts of a revolution was<br />
far fetched, ignoring and discrediting the courage of citizens who risked<br />
their lives, as well as the social networks and organizing that existed<br />
long before these digital tools came into being. 83<br />
Political scientists analyzing the role of technology in “political activism,<br />
movement activism or issue activism” often remind us that digital<br />
activism is “primarily activism,” where a group of people are working<br />
together for a common goal, and that technology does not and will not<br />
answer for us the traditional questions, of:<br />
● How do we recruit?<br />
● How do we coordinate and organize actions?<br />
● What is our main objective?<br />
● How will we reach that objective?<br />
● Who are our opposition/enemy and how will we confront them?<br />
Digital tools have the potential to make the process of political advocacy<br />
more participatory. It is therefore how we use these tools and not the<br />
tools themselves that determine success or failure. The reality is that<br />
digital tools have been revolutionized by activists who used them<br />
creatively to serve the social change agenda. <strong>Social</strong> change was not<br />
the original intention of the inventors of either Facebook or Twitter.<br />
So in this sense it is activism that has empowered or “enabled” the<br />
technology and not vice versa.<br />
82 Zero Anthropology. Maximilian Forte. America’s Iranian Twitter Revolution. June<br />
17, 2009.<br />
83 Slate. Jack Shafer. Doubting Twitter: Let’s not get carried away about its role in<br />
Iran’s demonstrations. June 17, 2009.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 53<br />
CASE STUDY 3: SUDAN<br />
Revisiting the offline and digital<br />
campaign for Nuba Mountains<br />
detainee Jalila Khamis<br />
Between mid-March 2012 and January 2013, Jalila Khamis (a teacher<br />
and mother of five) was Sudan’s most prominent female political<br />
detainee from the Nuba Mountains. She was kidnapped by Sudanese<br />
national security agents from her house in the early hours of March<br />
16, 2012 in her nightgown and imprisoned for nine months without<br />
charge. 84<br />
Jalila’s “crime” was that she was providing shelter in her home and<br />
seeking aid for a large number of internally displaced persons (and<br />
family members) fleeing the newly erupted conflict in the Nuba<br />
Mountains. She was also speaking out about the horrors and shelling<br />
sustained by the civilian population of the Nuba Mountains to Sudanese<br />
civil society and the diplomatic community in Khartoum. This included a<br />
video testimony recorded by Nagla’a Sid Ahmad, Sudan’s most prolific<br />
video blogger at the time. 85<br />
During the course of the following months, Jalila’s lawyers struggled to<br />
gain proper access to the details of her case. 86 There was unconfirmed<br />
news that Jalila was facing possible charges that included “undermining<br />
the constitution,” “spreading false information,” “inciting hatred” and<br />
“spying” for foreign entities. These charges, if confirmed, could carry the<br />
death penalty. Jalila was told verbally of these charges by the National<br />
Security and Intelligence Services (NISS), and that her video testimony<br />
on YouTube was used as the main evidence against her.<br />
Jalila’s lawyers were resistant to demands by Sudanese civil society<br />
and youth movements to launch more aggressive advocacy and/or<br />
media campaigns demanding that Jalila be charged immediately and<br />
receive a fair and transparent trial or be released. Her lawyers were<br />
under the impression that media exposure and campaigning would<br />
harm her case.<br />
Regardless of this, Sudanese women activists and youth movements<br />
refused to let Jalila’s case disappear into oblivion. They kept blogging<br />
about Jalila and spoke to the international media and international<br />
TWITTER<br />
2<br />
84 Girifna. Nuba Mountains Female Activist Arrested. March 18, 2012.<br />
85 YouTube. Girifna TV. Jalila Khamis and the Nuba people. November 1, 2012.<br />
86 Girifna. Trial of Rights Activist Jalila Khamis Shrouded in Secrecy. August 24,<br />
2012.
54<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
human rights organizations to ensure that her case got coverage. They<br />
also kept in close contact with her family. 87<br />
The turning point came in November 2012, when women’s rights<br />
activists and the Girifna movement coordinated a silent protest (in front<br />
of Omdurman women’s prison) with an online campaign. The social<br />
media campaign was synchronized on Twitter and Facebook, with the<br />
English and Arabic hashtags #Jalila8Months and .شهور_يا_جليلة#8 A<br />
large number of people on both Facebook and Twitter changed their<br />
profile pictures to Jalila’s picture and dedicated their status updates to<br />
demanding justice for her. 88<br />
87 Foreign Policy. Christian Caryl. An Idealist on Death Row. October 3, 2012.<br />
.شهور_يا_جليلة#8 88 Girifna. Join Girifna’s Campaign for Jalila #Jalila8Months<br />
November 7, 2012.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 55<br />
The social media campaign attracted considerable international<br />
media coverage. Global Voices covered the campaign, summarizing<br />
the Twitter discussion under the #Jalila8Months hashtag. 89 Open<br />
Democracy ran an article by an anonymous Sudanese activist, who<br />
detailed the hardships of Jalila’s detention including her four months in<br />
solitary confinement. 90 Osman Naway, an outspoken Nuba Mountains<br />
activist, wrote an article about Jalila’s unjust detention, highlighting the<br />
plight of the Nuba people and the violations committed by the regime<br />
in Khartoum against populations of the periphery. 91 And the Egyptian<br />
ONTV ran a full episode on the situation of human rights on Sudan<br />
starting with Jalila’s story and focusing on violence against women. 92<br />
Shortly after the online campaign, Jalila was summoned and told<br />
that she was to stand trial on December 13, for the first time since<br />
her imprisonment. 93 To mark nine months into her detention, a video<br />
was made by an activist, in which her family recounted their personal<br />
suffering because of her absence, especially that Jalila was the main<br />
breadwinner for the family as well as a mother and a wife. 94 This rich<br />
documentation gave Jalila unprecedented popularity and support in<br />
Sudan and internationally – she was no longer an anonymous, faceless<br />
detainee. She was a mother, teacher, wife and above all a champion of<br />
peace and justice for the people of the Nuba Mountains.<br />
With all the charges Jalila received verbally from NISS now confirmed,<br />
the stakes were high. The Sudanese regime banned any coverage<br />
of Jalila’s trial in the print media and delayed the trial several times.<br />
Nonetheless, the trial was closely watched and documented online by<br />
journalists, activists, video bloggers and other citizens. This collective<br />
of supporters made sure that every single detail and failing of the<br />
Sudanese justice system was circulated on social media and by word<br />
of mouth. Jalila’s court sessions were heavily attended (including heavy<br />
attendance by NISS), to the extent that there was often no place to sit. 95<br />
TWITTER<br />
2<br />
89 Global Voices. Maha El-Sanosi. Sudan: Nuba Mountains Activist Detained for 8<br />
Months. November 11, 2012.<br />
90 Open Democracy. Anonymous. Jalila Khamis: the high price of courage.<br />
November 8, 2012.<br />
91 AllAfrica. Osman Naway. Sudan – Race-Based Violence and Torture. November<br />
8, 2012.<br />
92 YouTube. ONtvLIVE. Sudan: Violation of Rights and Torture in Prisons. (In Arabic.)<br />
November 20, 2012.<br />
93 Girifna. Today Jalila Enters her 9th Month! December 15, 2012.<br />
94 Girifna. Video: Jalila Khamis’s family tell her story. December 17, 2012.<br />
95 Girifna. Summary of Jalila Khamis’s Court Session, Dec. 23, 2012. December<br />
28, 2012.
56<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Live updates from the trial were posted to Facebook and Twitter,<br />
prompting NISS to allow only journalists in the remaining court sessions.<br />
But even this step to limit attendance did not stop journalists like Amal<br />
Habani 96 from updating their Facebook pages with details. Moreover,<br />
Amnesty International issued a statement requesting that “fabricated<br />
charges” against Jalila be dropped and the European Union sent a<br />
representative to attend the trial. 97<br />
All this public pressure finally paid off when, on January 20, 2013,<br />
the prosecutor formally closed Jalila’s case declaring lack of sufficient<br />
information. Jalila was charged with disseminating false information, but<br />
the 10 months she spent in prison were deemed sufficient punishment<br />
and she was released immediately amidst celebrations in her honor by<br />
civil society, her family and neighbors. 98<br />
96 http://www.girifna.com/7489.<br />
97 Amnesty International. Sudan: Fabricated charges against Sudanese teacher<br />
must be dropped. January 16, 2013.<br />
98 Girifna. Video: Jalila Khamis is Free! January 21, 2013.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 57<br />
What Sudanese activists are<br />
learning from digital campaigns for<br />
political detainees<br />
The success of the campaign to free Nuba Mountains political detainee<br />
Jalila Khamis was not unique. The experience of Sudan’s civil society and<br />
youth movements, who have campaigned tirelessly for detainees since<br />
2009, shows that there are a few key elements of success such as:<br />
• The more visibility the better. Keeping the story of a detainee in the<br />
public sphere ensures their protection, contrary to what many lawyers<br />
and family members may think.<br />
• Video testimonies from family members are a game changer.<br />
Videos of mothers and/or families of detainees testifying and pleading for<br />
their support tend to circulate much faster than written statements. They<br />
also give a human element to the suffering endured by the families and<br />
by those in detention. It’s all about telling the story and telling it genuinely.<br />
• For long-term detainees frequent updates and documentation<br />
are necessary. These can be in the form of brief statements or opeds,<br />
preferably in Arabic and English, so that they capture local and<br />
international attention.<br />
• Using multiple new media tools to target diverse audiences is<br />
key. <strong>Use</strong> all the media tools at your disposal because each tool will target<br />
a different audience. In the Sudanese new media ecology, Facebook<br />
will target Sudanese citizens while Twitter will more likely target the<br />
international media; and satellite TV will capture the Middle East region,<br />
including Sudanese citizens inside Sudan and Sudanese communities in<br />
the diaspora.<br />
• Link your online campaigns with action on the ground and request<br />
concrete action from your supporters, such as changing their profile<br />
picture to raise awareness and/or attending an ongoing trial of a detainee<br />
or a planned solidarity stand.<br />
• When detainees are freed, remember to celebrate and to collect<br />
their testimonies in order to help assess their post-detention needs and<br />
expose the regime’s maltreatment.<br />
TWITTER<br />
2
58<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Some useful social media<br />
applications<br />
Below are applications that can boost your social media experience. Some<br />
of them work with a number of social media platforms such as Twitter,<br />
Facebook, YouTube, Instagram, Flickr, Google+ and others. However, this is<br />
not a comprehensive list of social media applications. We will be discussing<br />
others in later chapters.<br />
• Storify 99 can curate stories using content from Twitter, Facebook,<br />
YouTube, Instagram, Flickr and others. It is a great way to amplify and/or<br />
curate a Twitter campaign or a critical event for documentation and share<br />
with those not on social media, or who were not part of the conversation<br />
or were not following the event closely. Here’s an example of a Storify<br />
that captured a campaign on Sudan’s Public Order Law that took place<br />
in September 2013. 100<br />
• Speak to Tweet. 101 This is ideal in situations where the internet is not<br />
working and people need to communicate and share news urgently.<br />
“Speak to Tweet” allows you to call a number to record a message that<br />
is then tweeted on the web. (To see and hear those tweets go to: http://<br />
twitter.com/speak2tweet.) This feature was used for the first time during<br />
the Egyptian revolution when the Mubarak regime shut down access to<br />
the global internet for a few days. 102 Similarly, a “Speak to Tweet” account<br />
was also set up for Sudan during #SudanRevolts when there were fears<br />
that the Sudanese government might cut the internet; it was reactivated<br />
after the Sudanese government shut down the internet for 24 hours on<br />
September 25, 2013.<br />
99 http://storify.com.<br />
100 Storify. Sudan’s #PublicOrderLaw Back in the Spotlight. September 2013.<br />
101 https://twitter.com/speak2tweet.<br />
102 http://googleblog.blogspot.com/2011/01/some-weekend-work-that-willhopefully.html.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 59<br />
• BufferApp 103 lets you schedule tweets and create a buffer that will be<br />
automatically posted. This is ideal for online newspapers with a lot of<br />
new daily content and limited staff dedicated to tweeting. It also shares<br />
content from Facebook, LinkedIn and Google+ and allows an invited<br />
team of users to access one account, hence ideal for institutions.<br />
• Thunderclap. 104 This great app for online advocacy campaigns calls<br />
itself a “crowd speaking” platform. It was first used by the Obama<br />
administration to speak out for gun control. Since then it has been used<br />
by many. Thunderclap permits users to leverage the power of their<br />
Twitter followers and Facebook friends by asking them to donate their<br />
tweets and Facebook status updates to a cause. If they agree, there<br />
will be a synchronized blast of tweets and Facebook posts to create<br />
attention. To start, open an account on the Thunderclap page, create a<br />
short message that you want others to share, and invite your network to<br />
support you. The platform has analytics to help users track in numbers<br />
the level of support generated.<br />
• Wefollow 105 is a directory of prominent people on Twitter organized by<br />
interest or theme.<br />
• Trendsmap 106 tells you what topics and hashtags are most trendy by<br />
geographic region.<br />
• Bitly 107 shortens long URL links. Most useful for use with Twitter.<br />
• Paper.li 108 can be used with Twitter and Facebook to turn RSS feed into<br />
an online newspaper that is customized by topics or themes.<br />
• Flipboard. 109 Mainly for use on smartphones and tablets, this app takes<br />
content from your social media account, such as Twitter and Facebook,<br />
and turns it into an easy-to-view magazine. You can also customize and<br />
produce your own magazines based on specific themes. Download it<br />
from the Google or Apple stores.<br />
• TweetDeck 110 /Hootsuite 111 /Tagboard. 112 These are dashboards for<br />
managing multiple social media accounts and useful for creating analytics<br />
and reports. Hootsuite also archives hashtags or other Twitter searches.<br />
TWITTER<br />
2<br />
103 http://bufferapp.com.<br />
104 https://www.thunderclap.it/?locale=en.<br />
105 http://wefollow.com.<br />
106 http://trendsmap.com.<br />
107 https://bitly.com.<br />
108 http://paper.li.<br />
109 https://flipboard.com.<br />
110 http://www.tweetdeck.com.<br />
111 https://hootsuite.com.<br />
112 https://tagboard.com.
60<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
• Twestival 113 is a global movement of volunteers using social media to<br />
mobilize communities for a one-time charitable event in support of a<br />
cause they care about. All events are 100 percent volunteer-run and 100<br />
percent of the proceeds from ticket sales and donations go directly to a<br />
charitable project.<br />
• Unroll.me. 114 This app cleans unwanted clutter from your email,<br />
especially newsletters and email lists you are subscribed to. After signing<br />
in, it identifies all your subscriptions and gives you the option to subscribe<br />
or “roll” subscriptions into one email that you receive periodically.<br />
113 http://www.twestival.com.<br />
114 https://unroll.me.
CHAPTER 3<br />
Crisis mapping<br />
CRISIS MAPPING<br />
3
62<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CHAPTER 3<br />
Crisis mapping<br />
This chapter introduces readers to basic concepts<br />
related to crowdsourcing with a focus on crisis<br />
mapping. Another form of crowdsourcing,<br />
crowdfunding, is discussed in chapter 4. After<br />
a brief introduction to the practical applications<br />
of crisis maps in different sectors, geographic<br />
locations and situations, we take a look at the<br />
Ushahidi platform and explain what it has to offer<br />
and how it has evolved.<br />
We will then explore a number of other crisis mapping tools that have<br />
emerged in recent years. Top challenges facing crisis mappers are then<br />
addressed and some emerging solutions are proposed.<br />
This discussion on crisis mapping is supplemented with three expert<br />
interviews that include a talk with crisis mapping expert, Helena Puig Larrauri,<br />
who speaks about the lessons crisis mappers are learning in Sudan, the<br />
challenges they are facing and the technical skills and resources required<br />
to use the technology. We then move to Egypt to learn how crisis maps are<br />
being used to combat violence against women via the HarassMap project,<br />
which has now been replicated in other countries. We also spoke to Fareed<br />
Zain, an engineer who pioneered the first use of crisis mapping in Sudan<br />
during the 2010 elections. He spoke to us about his experience and the<br />
lessons learned from that first utilization of the Ushahidi platform in Sudan.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 63<br />
Crowdsourcing: definitions and<br />
practical uses<br />
Crowdsourcing is the term utilized to describe using the power of mobile and<br />
web technologies to reach out to and/or mobilize citizens; in other words,<br />
using the power of the “crowd” to get information that is shared, most<br />
often, for free or to get people to act – all in real-time. Those participating<br />
can be offering knowledge, skills or information, or even donating things.<br />
Crowdsourcing can also take the form of mining data or using readily<br />
available information on a specific topic or event that is produced voluntarily<br />
by users of a social media network such as Twitter or Facebook.<br />
Crowdsourcing has therefore been described as “a form of universally<br />
distributed intelligence, constantly enhanced and coordinated in real-time,<br />
that results in the effective mobilization of skills.” 115 It has been used by<br />
citizens, journalists and citizen journalists, governments and policy-makers,<br />
as well as businesses 116 gathering ideas for solutions or innovations,<br />
amongst many other uses.<br />
Perhaps one of the first professions or sectors to make use of the huge<br />
amount of user-generated content on social media was journalism. For<br />
example, during the 2009 Gaza war, Al Jazeera Arabic and English used a<br />
Ushahidi platform to crowdsource information about casualties because it<br />
was too dangerous for journalists to gain access to the Gaza Strip. Al Jazeera<br />
English and other media outlets also played a major role in amplifying the<br />
diverse voices of citizens during the Arab Spring revolts by capturing in realtime<br />
digital news collected from citizens who were witnessing events on the<br />
ground and sharing the information on social media platforms. Al Jazeera<br />
then posted that information on its blog, as well as integrating it with more<br />
in-depth news and verified analysis. 117<br />
CRISIS MAPPING<br />
3<br />
Crowdsourcing has also been used to support more practical citizen<br />
participation. An example of how governments crowdsource information<br />
from citizens to fix service-related problems is a US-based platform and<br />
phone application called SeeClickFix. 118 This application encourages<br />
citizens living in towns and cities to report problems linked to service<br />
delivery or infrastructure directly to their local administrators or Department<br />
of Public Works. By simply logging through their phones, residents can<br />
send a description of the problem, and its location, supplemented with<br />
photos. When a request is submitted, a confirmation number is sent to<br />
115 Tanja Aitamurto. Crowdsourcing for Democracy: A <strong>New</strong> Era in Policy-Making.<br />
Publication of the Committee for the Future. January 2012. P. 8.<br />
116 http://www.innocentive.com.<br />
117 Philip N. Howard and Muzammil M. Hussain. Democracy’s Fourth Wave? Digital<br />
<strong>Media</strong> and the Arab Spring. Oxford University Press. 2013. P. 100.<br />
118 http://seeclickfix.com.
64<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
the citizen and to the appropriate department and the request is placed<br />
in SeeClickFix’s database, which also eliminates duplicate requests. When<br />
the issue is resolved, its status is updated and posted. Citizens can submit<br />
requests in several languages and requests can be anonymous.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 65<br />
Crisis mapping: a basic<br />
introduction<br />
Perhaps one of the most prominent crowdsourcing tools to emerge in<br />
the last few years has been Crowdmapping – also called crisis mapping.<br />
Crowdmapping refers to gathering information from witnesses on a specific<br />
issue or mining readily available information generated by users on social<br />
media. Its uses have included the mapping of displacement of citizens during<br />
environmental crises, government corruption, sexual harassment of women,<br />
and election monitoring or fraud, among other things. The information is<br />
communicated by participants to a map, by sending a text message (SMS)<br />
through their cell phones or a tweet, or by visiting the website where the<br />
map is hosted and inputting the information on a form there.<br />
Crowdmapping is a compelling tool that visually illustrates the scope and<br />
spread of a certain phenomenon or crisis, and is often followed by extending<br />
help to those in need or introducing the necessary policy measures or<br />
solutions. 119<br />
Although crowdmapping is often compared to geographic information<br />
systems (GIS), it goes a step further than just visually presenting, analyzing<br />
and managing data on a map, to capturing a broader set of tasks that allow<br />
the filtering and categorizing of information. 120 For example, if your map is<br />
tracking the sexual harassment of women, you can search by location or<br />
type of attack as well as extract any media or multimedia coverage during<br />
a certain period of time. Some open source mapping platforms allow<br />
collaborative updates of maps, meaning that community volunteers can<br />
interact with and update maps directly.<br />
CRISIS MAPPING<br />
3<br />
119 Tanja Aitamurto. Crowdsourcing for Democracy: A <strong>New</strong> Era in Policy-Making.<br />
Publication of the Committee for the Future. January 2012. P. 10.<br />
120 The Conversation. Marta Poblet and Pompeu Casanovas. Crowdsourced crisis<br />
mapping: how it works and why it matters. May 15, 2012.
66<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Some videos to watch<br />
Video explaining what Ushahidi is, how it works and how it has been<br />
deployed worldwide. 121<br />
TED talk with social media guru Clay Shirky: How cognitive surplus will<br />
change the world. 122<br />
TED talk by Erik Hersman: How texting helped Kenyans survive crisis. 123<br />
Where it all began: Ushahidi<br />
Ushahidi, which means “testimony” in Swahili, is the most popular open<br />
source crowdmapping platform. 124 It is where the story of crisis mapping<br />
began as an experiment by a group of bloggers during the post-election<br />
violence in Kenya in 2007. The aim was to “map incidents of violence and<br />
peace efforts throughout the country based on reports submitted via the web<br />
and mobile phones.” 125 At the time, one of Kenya’s most famous bloggers,<br />
Ory Okolloh, began blogging about the violence, which was not covered by<br />
the local media. 126 She was soon overwhelmed with information from her<br />
readers and suggested that a Google map be set up so others could update<br />
it collaboratively. A group of other African bloggers and technologists read<br />
her request and decided to act upon it, leading to the creation of Ushahidi.<br />
Ushahidi allowed even the least connected Kenyan citizens to send reports<br />
via SMS, after an SMS short code was created with the telecommunications<br />
company Safaricom. 127 The map that was created helped Kenyans keep<br />
track of what was happening, report violence, request help and avoid<br />
dangerous areas. It was also used by relief agencies, such as the United<br />
Nations, which were providing support to victims.<br />
Since then the Ushahidi platform has been used by millions in over 100<br />
countries around the globe, and most of its data is crowdsourced from<br />
the public using social media and SMS. Ushahidi is now an international<br />
organization that defines itself as one that, “build[s] tools for democratizing<br />
information, increasing transparency and lowering the barriers for individuals<br />
to share their stories,” as well as “a disruptive organization that is willing<br />
121 Vimeo. What is the Ushahidi Platform? 2010.<br />
122 TED Talk. Clay Shirky. How cognitive surplus will change the world. June 2010.<br />
123 YouTube. TED. Erik Hersman: How texting helped Kenyans survive crisis. April<br />
22, 2009.<br />
124 http://www.ushahidi.com.<br />
125 http://www.ushahidi.com/about-us.<br />
126 TED Talk. Ory Okolloh. How I became an activist. June 2007.<br />
127 https://en.wikipedia.org/wiki/Short_code.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 67<br />
to take risks in the pursuit of changing the traditional way that information<br />
flows.” 128<br />
According to Patrick Meier, 129 a renowned crisis mapping expert (who<br />
formerly served as Director of Crisis Mapping at Ushahidi), Ushahidi is worth<br />
a shot because “the platform represents an important convergence of new<br />
technologies. SMS, Twitter, Facebook, YouTube, Flicker, smartphone apps,<br />
voicemail and email can all be combined with Ushahidi.” 130<br />
Since it was formed Ushahidi has gone through several upgrades that<br />
include: 131<br />
• Opening up the platform to third party developers for customization.<br />
• The creation of a smartphone app for Android and iPhones.<br />
• Easier mapping of multimedia that includes the integration of photos and<br />
videos. 132<br />
• In 2010, Ushahidi launched Crowdmap, which allows users to set up<br />
a Ushahidi map without having to install it on a separate server, hence<br />
making the process of setting up faster and simpler. 133 Crowdmap also<br />
allows users to login with their location and add relevant reports and<br />
information to a map.<br />
• SwiftRiver 134 is a platform that Ushahidi built that “enables the filtering<br />
and verification of real-time data from channels like Twitter, SMS, Email<br />
and RSS feeds.” It allows users to curate and analyze data in real time<br />
on specific topics.<br />
• Following the 2013 attack on the Westgate mall, Ushahidi’s team<br />
released Ping, a phone application that allows users to quickly notify<br />
family and friends that they are OK, by sending an SMS or email. Ping is<br />
open source, and has been improved since its first iteration to work on<br />
CRISIS MAPPING<br />
3<br />
128 http://www.ushahidi.com/about-us.<br />
129 http://irevolution.net.<br />
130 Patrick Meier. Ushahidi as a Liberation Technology. In Larry Diamond and Marc<br />
F. Plattner (eds.). “Liberation Technology: social media and the struggle for<br />
democracy”. University of Johns Hopkins Press. 2012. P. 96.<br />
131 http://www.open-steps.org/ushahidi-open-source-platform-for-collaborativedata-collection-nairobi-kenya.<br />
132 Patrick Meier. Ushahidi as a Liberation Technology. In Larry Diamond and Marc F.<br />
Plattner (eds.). “Liberation Technology: social media and the struggle for democracy”.<br />
University of Johns Hopkins Press. 2012. P. 97.<br />
133 http://ushahidi.com/products/crowdmap.<br />
134 http://ushahidi.com/products/swiftriver and http://www.ushahidi.com/2011/12/13/<br />
swiftriver-throws-a-lifeline-to-people-drowning-in-information.
68<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
• any kind of phone. 135 A public beta version of Ping is due for release in<br />
2016. 136<br />
• Recently Ushahidi launched BRCK, 137 which is a wireless battery and<br />
router that allows people to have internet access in the absence of<br />
electricity and/or a wireless internet connection. It is especially geared<br />
toward use in developing countries and remote locations.<br />
135 http://ushahidi.com/products/ping.<br />
136 http://pingapp.io.<br />
137 http://ushahidi.com/products/brck.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 69<br />
Other mapping platforms and what<br />
they offer<br />
Since Ushahidi was first set up in 2007, the sector of geomapping and<br />
crisis mapping has witnessed phenomenal expansion as well as the<br />
creation of new tools and platforms to make geomapping more accessible<br />
to communities and humanitarian volunteers globally. Below is a snapshot<br />
of some popular tools and what they offer.<br />
CRISIS MAPPING<br />
3<br />
OpenStreetMap<br />
OpenStreetMap 138 is a UK-based open source mapping platform that<br />
depends on a diverse community of enthusiastic mappers, GIS professionals<br />
and humanitarian workers mapping disaster-struck areas or even their<br />
own neighborhoods. It has over 1.5 million registered users and allows<br />
its members to access and edit raw data without restrictions or fees. 139<br />
OpenStreetMap emphasizes the importance of local knowledge in order to<br />
get the most accurate maps. It is an editable map. One of its best utilizations<br />
came right after the earthquake that struck Haiti in 2010, when in a matter<br />
of days hundreds of volunteers from around the world came together and<br />
crowdsourced the most detailed map ever produced of Haiti’s capital, Portau-Prince.<br />
Before that, Port-au-Prince was only partially mapped on Google<br />
Maps, and with very little detail. 140 A visualization of the evolution of the<br />
138 http://www.openstreetmap.org.<br />
139 http://osmstats.altogetherlost.com/index.php.<br />
140 National Geographic. Patrick Meier. How Crisis Mapping Saved Lives in Haiti.<br />
July 2, 2012.
70<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
OpenStreetMap during a period of 10 days in which more than a million<br />
edits were added to the map can be seen in this video. 141<br />
Geo Bucket and Easymappr<br />
Geo Bucket 142 and Easymappr 143 are easy to use mapping tools that can<br />
be used by volunteers and communities to gather data. They are geared<br />
toward users with very limited mapping skills and no map editing skills.<br />
They were both born in Uganda, under the patronage of the NGO Fruits<br />
of Thought. Both are applications that run on android smartphones (and<br />
can be downloaded from the Google Play Android store), but also support<br />
uploads of .GPX files. Both applications can also integrate maps seamlessly<br />
into OpenStreetMap.<br />
Geo Bucket is ideal for unmapped locations. It allows its users to map while<br />
they walk, by tracking the longitude and latitude of a phone and mapping<br />
roads accordingly as they move. This information is then uploaded to the<br />
Geo Bucket website where volunteers can use the information to map roads<br />
on the OpenStreetMap project.<br />
Easymappr puts data directly into OpenStreetMap by focusing on mapping<br />
specific categories of things, such as: drinking water/taps, markets,<br />
telecommunication towers, bookstores, recycling centers, and toilets.<br />
Mapbox<br />
Mapbox 144 is an open source cloud-based map hosting service and a tool to<br />
design maps that are visually appealing, can tell a story and are easily read<br />
by non-experts. 145 It is powered by OpenStreetMap and is collaborative and<br />
easy to update by anyone. Mapbox has been used by news agencies and<br />
non-profits to create customized, interactive maps with specific data sets<br />
(voting results during national elections, environmental issues, aggregation<br />
of a population by gender or age, etc.). On the downside, Mapbox does<br />
need some cartographic expertise and is hence not suited for direct use by<br />
communities with limited mapping skills.<br />
141 YouTube. Kanal von yobiSource. OpenStreetMap – Project Haiti. March 21,<br />
2011.<br />
142 www.geobucket.org.<br />
143 http://www.easymappr.com.<br />
144 https://www.mapbox.com.<br />
145 Digital Trends. Brandon Widder. Roll Your Own Maps: MapBox Wants to Become<br />
the Wikipedia of Digital Cartography. May 1, 2013.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 71<br />
Elva<br />
Elva 146 was founded in Georgia and has recently been converted from a<br />
project into an NGO. Elva, which means “lighting” or “express message” in<br />
the local language, is a mobile phone platform that allows easy feedback<br />
from local communities via SMS messages. At first glance it may sound like<br />
Ushahidi, but its founder says there are fundamental differences that include<br />
the following: 147<br />
• Elva does not focus on short-term crises, but rather tracks long-term<br />
issues such as community needs and the impact of policies on specific<br />
communities. Its founder, Dutch developer Jonne Catshoek, says that<br />
Elva is about, “governance and civil monitoring.” For example, the Elva<br />
platform permits its users to vote using SMS text messaging. The results<br />
are then reflected on a visual and interactive map. This has been used for<br />
taking national questionnaires on the developmental demands of citizens<br />
in Georgia. 148 It is also being used now in other conflict zones, such as<br />
Somalia. 149<br />
• Elva focuses on two-way communication with communities that<br />
have low internet penetration. Elva’s SMS format for surveys captures<br />
very detailed information from just one SMS. Elva’s utilization includes the<br />
recruitment of community volunteers who are trained to respond to SMS<br />
questionnaires periodically.<br />
• With Elva’s SMS function, an online questionnaire can be turned<br />
into a step-by-step SMS questionnaire. The team conducting the<br />
questionnaire can advertise a phone number or a short code provided<br />
by a local telecom company. Those interested in participating in the poll<br />
can then text the number and the system automatically begins a series<br />
of questions and responses over SMS, delivering each question in the<br />
poll as one SMS. 150<br />
CRISIS MAPPING<br />
3<br />
146 http://www.elva.org/about.<br />
147 Osservatorio Balcani e Caucaso. Onnik Krikorian. Elva, crowd-sourcing conflict<br />
in the South Caucasus. May 15, 2013.<br />
148 Voices from Eurasia (UNDP in Europe and Central Asia blog). Mark van Embden<br />
Andres. Elva Community Engagement helps map Georgia’s development<br />
priorities. October 11, 2013.<br />
149 Let Them Talk (blog). Helena P. Laurrauri. Re-thinking conflict early warning:<br />
Participatory polling in the Somali Region. February 22, 2014.<br />
150 Ibid.
72<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
• Elva has a security and conflict monitoring focus. It has been used<br />
to track incidents in conflict zones. It has also been used for conflict<br />
prevention by agencies like the United Nations and the European Union,<br />
and by non-profits. Data collected can be used to analyze trends for early<br />
warning systems and the software allows the use of regression analysis<br />
to forecast events.<br />
Google Crisis Map<br />
Google Crisis Map 151 is a program for the creation of geospatial maps aimed<br />
at making information more accessible during disasters; it is targeted at<br />
those responding to such emergencies as well as those impacted. It was<br />
developed by Google’s non-profit arm, Google Crisis Response team. 152<br />
Since 2008 Google has allowed local volunteers to contribute information<br />
during crises to enrich its maps. For example, Google Crisis Map was used<br />
extensively during the Pakistani floods of August 2010 and during Typhoon<br />
Yolanda in the Philippines in 2013. Since the Haitian earthquake (2010),<br />
Google’s Crisis Response team has responded to 25 disasters. 153 Google<br />
Crisis Map has the capacity to draw information scattered across the web<br />
in one place for easy access. They include the latest satellite images and<br />
information, such as flooded areas, shelters for victims, and neighborhoods<br />
impacted by power outages. The map is easy to view on mobile devices<br />
and easy to share on social media and to embed in any website. It also<br />
allows data to be imported into it in a number of web-friendly formats.<br />
151 https://support.google.com/crisismaps.<br />
152 http://www.google.org/crisisresponse/index.html.<br />
153 Al Jazeera America. Claire Gordon. How Google is transforming disaster relief.<br />
November 25, 2013.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 73<br />
Some videos to watch<br />
Crisis Maps from Google.org Crisis Response Team: this video explains<br />
what Google Crisis Map is and how it works. 154<br />
The Standby Task Force and the Libya Crisis Map: here Helena Puig<br />
Larrauri explains the work of the Standby Task Force (SBTF) after its<br />
first year of operation in Libya. 155<br />
Patrick Meier, Co-founder of Standby Task Force, talks about the<br />
SBTF. 156<br />
Patrick Meier’s TEDx talk on digital humanitarians. 157<br />
First Mile Geo: Inside Aleppo: A video that talks about the work of First<br />
Mile Geo in Aleppo, Syria. 158<br />
First Mile Geo<br />
First Mile Geo 159 is a relatively new online, cloud-based platform that<br />
generates printed map surveys and provides online tools to collect, analyze<br />
and visualize data from polls or surveys that are conducted on the ground<br />
with the help of local communities. That information is then geo mapped.<br />
So far First Mile Geo has been successfully used in conflict zones such as<br />
Syria and Somalia. What makes it particularly fitted for such environments<br />
is that it is optimized for low bandwidth environments and also allows<br />
paper surveys to be entered into the platform. It is therefore well adapted to<br />
situations of poor or unreliable internet connectivity.<br />
In Syria, for example, First Mile Geo was used to survey citizens in Aleppo<br />
on questions that covered: safety, population movement, crime, and basic<br />
service provision. Mapping this information helped assess humanitarian<br />
needs and also allowed the tracking of armed groups, which was important<br />
for humanitarian agencies who need to assess the security situation when<br />
making decisions. 160<br />
CRISIS MAPPING<br />
3<br />
154 YouTube. Google.org. Crisis Maps from Google.org Crisis Response Team.<br />
November 29, 2012.<br />
155 YouTube. CrisisMappersNet. ICCM 2011: The Standby Volunteer Task Force &<br />
Libya Crisis Map. February 2, 2012.<br />
156 YouTube. USAID Video. DevTalk: Patrick Meier. July 5, 2012.<br />
157 YouTube. TEDx Talks. Digital Humanitarians: Patrick Meier at TEDxTraverseCity.<br />
May 31, 2013.<br />
158 YouTube. First Mile Geo. First Mile Geo: Inside Aleppo. March 21, 2014.<br />
159 https://www.firstmilegeo.com.<br />
160 https://www.firstmilegeo.com/case_studies/aleppo.
74<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Top crisis mapping challenges and<br />
selected solutions<br />
To wrap up this chapter on crisis mapping (and before we dig into the<br />
interviews), we have selected the top five challenges that face crisis mappers<br />
globally and present some tried and tested solutions to those challenges.<br />
This, however, is not a comprehensive list of challenges that crisis mappers<br />
have encountered.<br />
1. The challenge of information overload and limited human<br />
resources was one of the major obstacles and a burden to mappers in<br />
the early years of crisis mapping. MicroMappers 161 was born out of this<br />
earlier experience of crisis mappers who realized that mapping requires a<br />
huge amount of human resources, because of the need to process the<br />
phenomenal amount of data generated by social media and survivors on the<br />
ground. 162 This usually meant that volunteers were quickly overwhelmed and<br />
that there was a huge backlog of unprocessed tweets and SMS messages<br />
– it was simply not sustainable during a huge crisis.<br />
The MicroMappers platform was hence set up to provide a community of<br />
volunteers who can be called upon, when needed, to gather, analyze and<br />
map social media data about a specific disaster area. It allows anyone in<br />
161 http://micromappers.com.<br />
162 National Geographic. Patrick Meier. How Crisis Mapping Saved Lives in Haiti.<br />
July 2, 2012.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 75<br />
the world with an internet connection to become a “digital humanitarian.” 163<br />
MicroMappers is made up of a number of applications called “Clickers”<br />
(some of which are still under development) that allow users to tag tweets<br />
and/or images (TweetClicker and ImageClicker).<br />
All one has to do is log into the MicroMappers website and start categorizing<br />
tweets and images that are geotagged. It takes three volunteers to decide if<br />
a tweet is relevant. Only then is that information moved to more experienced<br />
mappers, who build the map that will be used by humanitarian agencies, as<br />
well as survivors, to make important decisions.<br />
MicroMappers was first used, with great success, in south-west Pakistan<br />
in September 2013, when a 7.7 magnitude earthquake struck the region. 164<br />
The United Nations reached out to the founder of MicroMappers, Patrick<br />
Meier, asking for help. This presented an opportunity to test MicroMappers<br />
even before it was fully developed. Within the first few hours 35,000 tweets<br />
were collected and categorized by 100 volunteers. 14,000 tweets were<br />
deemed “relevant” and about 400 images were mapped. MicroMappers<br />
was also used in the Philippines during typhoon Haiyan.<br />
This was all made possible through the tireless efforts of the Standby Task<br />
Force (SBTF) 165 (working under the Digital Humanitarian Network 166 ), which<br />
is an online volunteer technical community of more than 800 mappers from<br />
over 70 countries, who are deployed on request by the United Nations and<br />
others to work on large-scale emergencies. This approach reduces the costs<br />
of coordination and pulls together a technical network of experts to respond<br />
faster and on a larger and more sustainable scale. In the next development<br />
phase of MicroMappers, SMS, video and translation applications are being<br />
developed to make the data available to mappers using the platform richer<br />
and more diverse.<br />
CRISIS MAPPING<br />
3<br />
2. Coordination of tasks and communication messages during a<br />
humanitarian crisis can be a major challenge. Many maps and SMS short<br />
codes can pop up, leading to the replication of work and data and to the<br />
confusion of communities receiving this information. For those affected by<br />
a crisis, access to information is a basic need. It can save many lives by<br />
raising the awareness of communities about their situation and getting their<br />
feedback on immediate needs, hence improving the prospect for service<br />
delivery. However, lack of coordination by those responding can mean that<br />
beneficiaries do not get the information that is most relevant to them.<br />
163 FastCompany. Ayana Byrd. Micromappers Lets Anyone Become a Digital<br />
Humanitarian. November 21, 2013.<br />
164 Wired.co.uk. Katie Collins. How AI, Twitter and digital volunteers are transforming<br />
humanitarian disaster response. September 30, 2013.<br />
165 http://blog.standbytaskforce.com.<br />
166 http://digitalhumanitarians.com.
76<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Some experts have advised that an “SMS code of conduct” be set up<br />
to streamline and centralize the flow of information and to make sure<br />
that information provided to communities is demand driven. Specific<br />
recommendations here include allowing recipients of SMS messages to<br />
request specific information depending on their location, and to unsubscribe.<br />
Other suggestions include setting up a “clearing house” that screens all<br />
outgoing SMSs, in addition to a complaints mechanism. 167<br />
One tool that can be used to streamline the division of labor amongst<br />
different actors responding to an emergency is Crisis Cleanup, 168 which<br />
is an open source US-based service that is built on Google App Engine<br />
and allows organizations to login and take ownership of tasks. Those tasks<br />
are then marked as “claimed” in a log that is transparent to all users of<br />
the platform. Tasks can be claimed remotely, hence reducing the need for<br />
coordination meetings. Locations in need of support can be identified and<br />
people who need help can also access the system to see if their area has<br />
been served. Crisis Cleanup can therefore allow for more transparency and<br />
accountability, and has so far been used in 4 countries in response to 12<br />
disasters. 169<br />
3. Using technologies closer to the local reality is key. It is vital that<br />
communities in need are reached through technologies that they can access<br />
locally, such as local media, community radio, and SMS or text messaging.<br />
Organizations like Internews 170 and First Response Radio 171 specialize in<br />
setting up public radio stations in local dialects during emergencies.<br />
167 iRevolutions. Patrick Meier. Towards an SMS Code of Conduct for Disaster<br />
Response. March 6, 2010.<br />
168 https://www.crisiscleanup.org/home.<br />
169 <strong>Social</strong> <strong>Media</strong> for <strong>Social</strong> Good. Timo Luege. Crisis Cleanup Helps Coordinate<br />
Disaster Responses. July 9, 2013.<br />
170 https://internews.org.<br />
171 http://firstresponseradio.org.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 77<br />
Additionally, the free and open source software FrontlineSMS can assist with<br />
sending large amounts of text messages, as well as receiving and managing<br />
SMSs. 172 While FrontlineSMS does not require an internet connection and<br />
the software can be downloaded for free, you will pay for each text message<br />
you send and might want to consider negotiating a rate with your local<br />
telecom provider.<br />
Video and additional material to read<br />
A video that explains the power of SMS and FrontlineSMS. 173<br />
Verification Handbook: An Ultimate Guideline on Digital Age Sourcing for<br />
Emergency Coverage. 174<br />
4. Low or unstable internet connectivity is an expected challenge in<br />
many developing countries or after natural disasters. If this is the case,<br />
make sure to set up your system so data can be collected and saved offline<br />
and later synchronized when the internet is available, or use a platform like<br />
First Mile Geo, 175 which is adapted for low bandwidth.<br />
5. Verifying information. <strong>Use</strong>r-generated content in the aftermath of a<br />
disaster or emergency can be very high and can include a fair amount of<br />
rumor or inaccurate information. Nonetheless, user-generated content<br />
remains a valuable source of information for journalists and crisis mappers<br />
during a humanitarian crisis or political upheaval.<br />
Some would go as far as to say that social media have revolutionized<br />
journalism and allowed real-time coverage even in situations where journalists<br />
were not able to be on the ground. One such journalist is Andy Carvin, the<br />
senior social media strategist for National Public Radio (NPR), who shot<br />
to prominence for his live tweets about Tunisia, Egypt and Libya in 2011<br />
during the Arab Spring. 176 In his book, Distant Witness: <strong>Social</strong> <strong>Media</strong>, the<br />
Arab Spring and a Journalism Revolution, 177 he describes how he created<br />
a “Twitter newsroom” by gradually compiling a list of trusted sources, who<br />
were based in the region and had specialized knowledge and presence in<br />
CRISIS MAPPING<br />
3<br />
172 http://www.frontlinesms.com/technologies/frontlinesms-overview.<br />
173 YouTube. Tech <strong>Change</strong>. Laura Walker Hudson on the Power of SMS. December<br />
5, 2012.<br />
174 Craig Silverman. Verification Handbook: An Ultimate Guideline on Digital Age<br />
Sourcing for Emergency Coverage. 2014.<br />
175 https://www.firstmilegeo.com.<br />
176 NPR. ‘Distant Witness’: <strong>Social</strong> <strong>Media</strong>’s ‘Journalism Revolution’. January 31,<br />
2013.<br />
177 http://www.amazon.com/Distant-Witness-Andy-Carvin-ebook/dp/<br />
B00ARN9Q2S/ref=sr_1_1?s=books&ie=UTF8&qid=1399138922&sr=1-<br />
1&keywords=distant+witness.
78<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
specific locations, with whom he collaborated to verify information posted<br />
on Twitter. However, Carvin stresses that it is important to get acquainted<br />
with one’s sources outside social media and to know their affiliations,<br />
weaknesses, strengths and biases. 178 He noted that he would often press<br />
his sources for verification and would deeply question the context because<br />
a lot of context can be lost when people are posting updates in a state of<br />
shock or from a very specific context or location.<br />
Crisis mapper Patrick Meier points out that the future of verification in crisis<br />
mapping is moving toward the use of advanced computing options that<br />
include combining the use of machine computing and human computing<br />
(i.e., outsourcing tasks to a human crowd and then collecting and analyzing<br />
that information automatically). He notes that both fields are new but are<br />
developing quickly, and gives the example of the Verily platform, a human<br />
computing tool used to verify social media content, 179 “A parallel goal of the<br />
Verily project is to crowdsource critical thinking”, says Meier. 180 Verily is like<br />
a blackboard where information shared is discredited or verified by users of<br />
the platform. It will be especially useful for verifying conflicting information<br />
during disasters, such as images and/or videos. The platform has an<br />
incentives mechanism where people are given points to build their credibility<br />
and reputation for accuracy. <strong>Use</strong>rs of the platform can also post questions<br />
on Facebook or Twitter that need to be answered with a yes or no. Those<br />
with evidence can reply directly to Verily with text, pictures or video and are<br />
required to write a justification or explanation. Verily was launched in 2014.<br />
178 Craig Silverman. Verification Handbook: An Ultimate Guideline on Digital Age<br />
Sourcing for Emergency Coverage. 2014. PP. 71 and 75.<br />
179 http://veri.ly.<br />
180 Craig Silverman. Verification Handbook: An Ultimate Guideline on Digital Age<br />
Sourcing for Emergency Coverage. 2014. P. 80.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 79<br />
Interviews<br />
The uses and challenges of crisis mapping in<br />
Sudan and what we are learning<br />
Helena Puig Larrauri 181 is a peacebuilding practitioner who<br />
focuses on the intersection of technology, peacebuilding and conflict<br />
prevention. She is a freelance consultant, working with NGOs and<br />
the United Nations in conflict and post-conflict countries, including<br />
Sudan, Libya, Cyprus, Zimbabwe, Nepal, Kyrgyzstan and Iraq.<br />
Helena is also a co-founder of the Standby Task Force, an online<br />
volunteer technical community that is active in crisis mapping,<br />
comprised of more than 800 volunteers from around the globe.<br />
In this interview, Helena speaks about the lessons crisis mappers are<br />
learning in Sudan, the challenges they are facing and the technical<br />
skills and resources required to use the technology.<br />
CRISIS MAPPING<br />
3<br />
Q1. You have worked in Sudan for a few years and have<br />
seen the way crisis mapping has been adopted by Sudanese<br />
citizens from its very first uses during the national elections<br />
of early 2010 to subsequent uses during the January 30,<br />
2011 protests, during the protests of the summer of 2012<br />
(#SudanRevolts), and most recently during the humanitarian<br />
crisis following the floods of August 2013. Can you tell us what<br />
lessons we are learning in Sudan from these experiences?<br />
What mistakes do we keep doing that make it hard to benefit<br />
from fully utilizing the power of the data collected from crisis<br />
maps?<br />
The main lesson that people are learning, looking at the evolution<br />
from the Sudan Vote Monitor, during the 2010 elections to the<br />
crisis map set up for Nafeer during the floods of August 2013, is an<br />
increase in focus on what the data was being collected for and what<br />
it would be used for.<br />
With the elections, there was a lot of focus on collecting data and<br />
with voting and electoral fraud, but there wasn’t a clear action plan<br />
181 http://letthemtalk.org/bio.
80<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
as to what would happen with that data afterwards. I think with every<br />
iteration people are getting better at the things they really need to<br />
focus on and what happens with the data afterwards.<br />
In terms of mistakes that I’ve seen, I think there are a few smaller<br />
ones, but the main one is really a miscalculation on the resources<br />
that are needed to process data. There is a lot of focus on resources<br />
and on thinking and on time for collecting data, but I think that<br />
people using crisis maps in Sudan don’t fully budget for the amount<br />
of time and the amount of resources that are needed to verify data,<br />
to clean it and to then analyze it. That’s not something particular<br />
to Sudan, it’s something crisis mappers in other countries have a<br />
problem with as well.<br />
Q2. What are the main challenges for a country like Sudan<br />
when it comes to employing crisis mapping in these different<br />
events or scenarios (elections, protests and humanitarian<br />
crises)?<br />
There is one challenge that is common to all of these scenarios<br />
(elections, protests and humanitarian crises) and that challenge is<br />
the challenge of connectivity. As you know, internet connectivity in<br />
Sudan is not widespread across the country. It’s pretty concentrated<br />
in the capital. And mobile phone connectivity is pretty good, but it<br />
can be patchy. Certainly connectivity with data through a phone is<br />
very patchy.<br />
The main problem is that a crisis map is online, typically, and<br />
Sudanese crisis mappers need to find ways to get data from<br />
populations that don’t have access to the internet, whether it is<br />
through mobile phones or through the creative use of radio or word<br />
of mouth.<br />
These are very different events in terms of their political context.<br />
It is easier to have a crisis map for a humanitarian crisis because<br />
there is a common understanding that if you’re mapping needs, it’s<br />
something that everyone agrees on. There’s no doubt that people<br />
are in need. Even if certain political elements would prefer not to<br />
make that public, it’s an objective fact – people are in need.<br />
When it comes to elections it gets a little bit more difficult because,<br />
although there is a common understanding that election monitoring<br />
is a good idea ... perhaps not everyone would want the outcome of<br />
election monitoring to be quite so public.<br />
When it comes to protests it becomes even harder, because there<br />
are certainly a lot of elements in the Sudanese political scene that<br />
do not want the truth about what is happening in Sudan to be public<br />
and visible online.<br />
The challenge that is different with these three scenarios is the<br />
challenge of knowing whether a map will be blocked, or whether
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 81<br />
the means of communicating with a map will be blocked, or whether<br />
it will be hacked in some way. For protests, that is a very strong<br />
challenge. For humanitarian crises that is not really a challenge.<br />
Q3. In Sudan it seems that so far we have used crisis mapping<br />
generated by citizen efforts during an emergency of sorts.<br />
What would you say is a basic checklist for those launching<br />
such efforts under time restrictions and resource restrictions?<br />
There are three top things that people need to be thinking about in<br />
a crisis situation:<br />
●<br />
●<br />
●<br />
The first one is what will this data be used for? Who is your<br />
client? Who is your audience? And what are they going to do with<br />
this data? Are you trying to inform the media? Are you trying to help<br />
volunteers who are distributing things for basic needs? Are you trying<br />
to provide information to the National Electoral Commission? What’s<br />
the aim of the map? That has to be determined very quickly. It should<br />
be the focus of the map, because you are in a crisis situation and<br />
resources are limited, so that you really focus your efforts on getting<br />
the information that is needed for that audience.<br />
The second thing would be, that in a crisis situation there is a<br />
tendency to jump to the crisis mapping tool that most people<br />
know, which in Sudan is Ushahidi, which is an online mapping tool.<br />
And that might not be the best technical solution. So I would say,<br />
despite the time pressure, spend a moment thinking about what is<br />
the best technical solution for what you are trying to do.<br />
Thirdly in a crisis situation, in particular, there is a tendency to<br />
think very short-term. So lots of volunteers are willing to work on<br />
the crisis map at the very beginning. But maybe a week or a week<br />
and half down the road you’ve lost all the people who were working<br />
on the crisis map. If you’re being offered volunteers who want to<br />
work on the crisis map, try to stagger those resources. Don’t put<br />
them all at the beginning. Try to make sure that a week or a week<br />
and a half from now you will still have people to run the crisis map.<br />
There have been uses of crisis maps outside of emergency situations.<br />
There’s a project called Madrasatna, 182 which is a non-emergency<br />
crisis map that is mapping schools in Sudan.<br />
Q4. One thing you mentioned was that people tend to<br />
automatically think about Ushahidi, but it might not be the<br />
best option. Are you implying that there are now other options,<br />
similar to Ushahidi and probably easier to use?<br />
There are definitely other options. It’s not that they are easier to use<br />
in all circumstances, it’s that for certain types of jobs, they might<br />
CRISIS MAPPING<br />
3<br />
182 YouTube. Madrasatna. Madrasatna. (In Arabic.) April 29, 2014.
82<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
do the job better. And they are just as easy to use as Ushahidi. For<br />
example, Google’s Crisis Map is a free online resource. It’s more<br />
useful for certain kinds of information. People might want to look<br />
at the Elva platform and Caress Geo (which recently changed its<br />
name to First Mile Geo), which is another mapping tool. There are<br />
a number of other tools, but I would say these are your top three to<br />
check, as well as Ushahidi.<br />
Q5. What guidance can you give citizens and civil society<br />
groups who want to use crowd sourcing or crisis mapping<br />
for other purposes (such as tracking youth unemployment, or<br />
reporting water shortages in their neighborhoods, or sexual<br />
harassment of women)? What kinds of skills are required to<br />
use this technology?<br />
All of the tools that I’ve just mentioned can be used by someone who<br />
is comfortable on a computer, who is comfortable on the internet,<br />
but who is not a coder or programmer. You have to be computer<br />
literate and maybe know how to use an excel spreadsheet.<br />
However, if you want to use one of those tools and customize it to<br />
meet exactly what you want to do, so exactly the type of categories<br />
of data or something a little bit more advanced, then you need<br />
to have programming and coding skills. You can use a standard<br />
template of Ushahidi, without any technical skills. But if you want to<br />
customize it you’ll need some coding skills.<br />
Some of these tools require you to have server space and to be able<br />
to install a piece of free software on a server. So you have to get the<br />
server space and install the tool. If you are not able to do that, then<br />
you have to use something that is hosted on the cloud or hosted<br />
on the internet. For example, Ushahidi and some of the other tools I<br />
mentioned also offer that option for free.<br />
Q6. The real work behind crisis mapping is done on the<br />
ground with people and the relevant communities. Can you<br />
elaborate on that?<br />
Absolutely, the real work behind crisis mapping is identifying what<br />
the needs for data are and then finding that data, and collecting<br />
it in a way that is sensitive to the stories that communities want to<br />
tell. If you’re thinking about crisis mapping, 10 percent of your effort<br />
and your human resources should be devoted to the technology<br />
and to the data processing, and 90 percent of your effort should<br />
be devoted to community organizing and to talking to people about<br />
sharing their stories and understanding what they need to share.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 83<br />
Q7. In Sudan, has this been a challenge? Are we learning? Are<br />
we getting this?<br />
In Sudan, the groups that are doing crisis mapping initially were<br />
pretty focused on the technical stuff. There was a divide between<br />
the people who are really involved in organizing and the people who<br />
are really involved in the technical side. My sense is that groups like<br />
Madrasatna are bridging this divide – that they have both. I think that<br />
Sudanese crisis mappers are getting there.<br />
CRISIS MAPPING<br />
3
84<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
How HarassMap in Egypt is using crisis<br />
mapping to fight the sexual harassment<br />
of women<br />
HarassMap 183 is an online crowdmapping platform founded in<br />
2010 to address the chronic problem of the sexual harassment of<br />
women in Egypt. It collects information from witnesses and victims<br />
of sexual harassment, and uses a referral system to support victims.<br />
HarassMap also works with community networks on the ground to<br />
create “zero tolerance” sexual harassment zones. Since its founding,<br />
HarassMap has grown from a small number of volunteers to almost<br />
1,000. Its phenomenal success has led to its replication in eight<br />
countries in North Africa, the Middle East, and South Asia.<br />
Rebecca Chiao, one of the co-founders and the director of<br />
HarassMap in Egypt, spoke about her experience. 184<br />
183 http://harassmap.org/en.<br />
184 Human Rights First. HarassMap Founder Addresses Sexual Violence in Egypt.<br />
November 9, 2012.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 85<br />
Q1. What’s the story behind HarassMap? How and why was<br />
the idea of HarassMap born?<br />
The story of HarassMap is a bit of a personal story because me and<br />
my co-founders, who are Angie Khozlan, Amal Fahmy, and Sawsan<br />
Gaid, experienced this problem ourselves as women living in Egypt.<br />
We had all worked on this issue for several years before we launched<br />
HarassMap.<br />
The problem was that at the time we decided to start HarassMap,<br />
there was no project or activity going on in Egypt that was engaging<br />
the public or working with the public on a social level on this issue.<br />
There was some work being done by NGOs on advocacy for a new<br />
law. So we felt that in order to have the laws implemented or to have<br />
any impact on our daily lives, in our experiences as well as everyone<br />
else that we know, there needs to be a way to engage all of society<br />
in working together on this issue.<br />
To be honest we didn’t want to start this ourselves as an independent<br />
initiative. We wanted an NGO to take this on because they have<br />
resources, infrastructure, and experience. But none of them were<br />
interested so we started HarassMap as an independent group of<br />
volunteers. It was us four at the beginning and it grew from there.<br />
Q2. How does HarassMap technically work? What online<br />
platform does it use? How is data collected? What data does<br />
HarassMap crowdsource and what is done with that data?<br />
Our model is a little bit complicated because we have it integrated<br />
together with different activities. I’ll try to explain it from the first step.<br />
The very beginning is a Ushahidi-based reporting and mapping<br />
system. Victims and witnesses can send a report to us about what<br />
happened to them and where; what their experience was and any<br />
details they want to provide – and it’s anonymous. They can send it<br />
by SMS on their mobile phone, by a form on our website, by social<br />
media like Facebook and Twitter, or by email. They can send a report<br />
and get an auto-response from us about how to get services that<br />
are offered for free to victims already existing with [other] NGOs. We<br />
set up a referral network of organizations that provide support to<br />
victims. We use this mechanism to try and spread the word about<br />
this [problem].<br />
This is only a small part of what we do. We just started with it because<br />
it was an amazing opportunity to reach out and open a channel<br />
of communication to more people than have ever been reached in<br />
Egypt by an NGO project or a social project at this point.<br />
When we launched in 2010, 97 percent of Egyptians owned mobile<br />
phones. Now it is more than 100 percent, technically speaking,<br />
because many people have more than one. This was for us a very<br />
attractive way to reach more people geographically and socially than<br />
CRISIS MAPPING<br />
3
86<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
we ever would have been able to [reach] ourselves, with direct NGO<br />
work. But we didn’t want this to be just a website, or just a reporting<br />
system. We want to be able to give people an answer when they ask<br />
us, “What happens after I report? So what? What does a report do<br />
to change this problem?”<br />
Most important to us are these next steps.<br />
We take all of the reports and publish them on our website<br />
anonymously and map them on a map of Egypt. So it can be<br />
communicated that this isn’t a rural problem or an urban problem<br />
specifically – it crosses all social classes. It crosses all times of day,<br />
all types of women and how they’re dressed. Sometimes even<br />
men. So it breaks a lot of stereotypes, and we use this in public<br />
campaigns that try to change the attitude of society. We target<br />
mostly bystanders and we try to break the stereotypes that stop<br />
them from intervening when they see harassment happen.<br />
A lot of times this means stereotypes of what women are wearing,<br />
stereotypes about men and what drives them to harass or assault<br />
women. Our communications unit takes all of this data that we<br />
collect, and they craft messages that try to rebrand harassment from<br />
something that is considered cool or acceptable or masculine or fun<br />
(all of these are what we experience from people today), and we try<br />
to change that to a more positive role model, that the people who<br />
are standing up to harassment are cool and masculine and Egypt’s<br />
future, the people we should look up to.<br />
Q3. What work is done offline at the community level to<br />
complement the crowdsourcing of information online?<br />
We also use this information in our community outreach unit, which<br />
is the main part of what we do. We have hundreds of volunteers all<br />
over Egypt, and we train them to organize their own communities<br />
in ways that engage people to change their behavior from one<br />
that ignores harassment or accepts it or tolerates it or stays silent<br />
about it, to one that stands up to it. And we created these zerotolerance<br />
areas where harassers feel that they’re not welcome or<br />
that there will be some consequences. This will make them think<br />
twice about harassing or assaulting someone and hopefully deter<br />
them in the future. In this way little by little hopefully we will change<br />
what’s happening on the ground in reality, as well as going beyond<br />
awareness, going beyond attitude change and making behavioral<br />
change in the streets.<br />
This is something we’re also trying to expand into a workplace antiharassment<br />
campaign, and we’re also starting work in schools and<br />
universities.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 87<br />
Q4. What were the main challenges with using the crisis map<br />
(associated with anonymous crowdsourcing of reports of<br />
sexual harassment) when you first launched it? And how did<br />
you work around these challenges?<br />
We had many challenges. When we started we were completely<br />
volunteers and we had full-time jobs and no money – we paid for<br />
everything ourselves. We were really limited in terms of capacity and<br />
for us this was the biggest challenge. From the first day we launched<br />
we had too many volunteers for us to handle. They were more than<br />
100, I think. It was difficult to do the plans that we wanted to do<br />
while not having enough people to keep track of everything, and to<br />
organize it and carry it out.<br />
Just after we launched (in December of 2010), the first demonstrations<br />
in Egypt’s revolutions started in January 2011. Since then we’ve had<br />
several governmental changes, so we’ve had lots of instability. This<br />
is also very difficult; it makes planning our community work really<br />
hard. There is always something going on, so we always have to<br />
change our plans, and this takes a bigger capacity than what we<br />
usually have.<br />
In terms of the data and the technological challenges, the first<br />
challenge was that we had to adapt the technology to what was<br />
available in Egypt. Because here in Egypt we couldn’t find the mobile<br />
phone that uses FrontlineSMS, as directed by the instructions on the<br />
[Ushahidi] website, we had to find a way around that.<br />
We don’t have regular internet. We also have a problem with locations<br />
here. Ushahidi is set up to be a bit automated, so in some countries<br />
you can just give an address in the phone, or GPS coordinates, and<br />
it automatically maps the location of the report that you are sending.<br />
In Egypt we don’t really use street addresses very much, we usually<br />
describe things like, “In this neighborhood, next to the McDonald’s,<br />
down the street from the school.” And of course Ushahidi is not able<br />
to handle this kind of description.<br />
We also have a language challenge in that reports come in Arabic,<br />
they come in English, they come in Arabic written in English letters,<br />
so it’s pretty haphazard. These are challenges that we had to figure<br />
out. Thankfully we are doing ok with that.<br />
The verification was a challenge we thought we would have before<br />
we launched. But as soon as we launched we realized that it didn’t<br />
turn out to be a problem. Fake reports are really easy to identify, and<br />
real reports are really clear that they’re real. We look at each report<br />
personally, and we read it and we make sure that it’s believable and<br />
it’s mapped accurately and has all the important information in it. But<br />
we don’t go out and physically verify that people are telling the truth<br />
because, just like any other data collection, there is going to be the<br />
possibility that someone exaggerates or someone misremembers<br />
something. There is always a margin of error because people are<br />
CRISIS MAPPING<br />
3
88<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
fallible – and this isn’t the most important thing. The most important<br />
thing to us is that we learn important information about what’s going<br />
on in the streets, so we could address it in an effective way and we<br />
could share this information with other people addressing it, so that<br />
they can be effective as well. And that victims and witnesses can<br />
have a voice – a way to talk about this – and to talk freely and safely<br />
where they don’t have to fear being punished or being attacked, or<br />
any of these other consequences that we sometimes hear about.<br />
Last year there was a terrible incident in Asyut, where a girl who was<br />
harassed by a man on a motorcycle spoke back to him and spat at<br />
him. He beat her and then shot her, and she died. So sometimes<br />
speaking back is not always a safe option. This is important to us as<br />
well, and to be able to connect people with help. Even though we<br />
can’t provide professional counseling or legal service ourselves as<br />
HarassMap, we have partners that do this for free. So at least we’re<br />
able to put people in touch with them.<br />
Q5. How were you able to advertise for HarassMap to get 100<br />
volunteers from the first day?<br />
It might not be 100. Our numbers during that time when we were<br />
first volunteers are very inaccurate. I was just making a guess. But<br />
it was a lot, it was more than we could handle. We didn’t have the<br />
capacity to advertise. We decided to test our online platform before<br />
we launched. It was in mid-October when we decided to test this<br />
out with our friends on Facebook and Twitter just to see if it was<br />
going to have any technical problems or if it works. Angie and I were<br />
sitting at my house having lunch together and we just decided to<br />
do it spontaneously, and within 24 hours the website crashed. We<br />
don’t know how people heard about this. We thought we were just<br />
telling our friends. Then we got a lot of volunteers and a lot of media<br />
coverage; it must’ve been through social media.<br />
Q6. How has HarassMap evolved from the time it was<br />
launched in terms of its overall objectives, scope and reach –<br />
both online and offline?<br />
We have gotten amazingly better at what we do. When we first<br />
launched we had a model, a plan. We were able to implement it<br />
on a small scale, and we got good feedback about it. So [we] kept<br />
trying to improve how we are doing it, improve our ability to do it and<br />
continually take feedback and try to implement it.<br />
We all had full-time jobs, and it was really hard to do this on evenings<br />
and weekends, especially when the commute in Cairo to and from<br />
work is sometimes two hours long. It was tough. The real turning<br />
point was in June 2012 when we got a grant from IDRC for a<br />
research project. This gave us a little bit of money to hire some core<br />
staff. When we hired the staff they were incredible. They were much<br />
more skilled than me and Angie, or any of us. They had the ability to
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 89<br />
improve on the work that we are doing, and the plan that we had, to<br />
incorporate the feedback and make things strong and do a thorough<br />
job with what the original model was. But then also to expand and<br />
come up with new ideas that we have never thought of before.<br />
Starting with the middle of 2012 it was a whole new story for us, and<br />
we were able to expand the number of places that we are in, but<br />
also deepen our work and do it in a much better way. Now, instead<br />
of having a couple of hundred volunteers that were enthusiastic but<br />
badly trained, we have a couple hundred very well trained volunteers,<br />
and they have their own teams in their local communities as well,<br />
and it’s much stronger and much more consistent.<br />
They are doing much more work on the ground and we are integrating<br />
creative ideas, like cooperating with a project that does open-mic<br />
events where people have five minutes to talk about this issue and<br />
just say what’s in their hearts or what happened to them, no matter<br />
what they think, whether they agree with us or not. This has opened<br />
up an important dialogue in communities.<br />
We are starting a partnership as well with another initiative that works<br />
directly with harassers, which is something we don’t do ourselves.<br />
I think this is starting to strengthen the work a lot, and making it<br />
possible for these local teams in different communities around<br />
Egypt to have a good, effective and dynamic approach, which is<br />
appropriate for their communities and led by them and not by us<br />
sitting in Cairo. So this has been the real change for us.<br />
Q7. What impact has access to reliable visual, quantitative<br />
and qualitative data on sexual harassment against women in<br />
the streets of Cairo had in terms of pressuring the authorities,<br />
persuading/helping civil society actors and making sure that<br />
women impacted by sexual harassment get the support they<br />
need.<br />
This is something that we’re very slow on setting up. We just found<br />
a Monitoring and Evaluation (M&E) consultant to come and help<br />
us design a formal M&E system. So soon hopefully we will be able<br />
to have measurements of results. Before this we didn’t have the<br />
capacity to do it in an accurate, measurable, scientific way – we just<br />
did it the best we can.<br />
We have a lot of anecdotal information, and we take feedback after<br />
every event, after every volunteer-organized community event. We<br />
take a lot of feedback and we discuss it, analyze it, and we try to<br />
adjust our program based on that feedback.<br />
We have some measurements of things like when we make social<br />
media campaigns, we can estimate the spread, but we can only<br />
estimate the first layer. If you share something on Facebook you can<br />
CRISIS MAPPING<br />
3
90<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
see how many people shared directly from you, but you can’t tell<br />
how many have shared from the people who shared. 185<br />
For example, in our public campaign that we did, countering the<br />
myths about sexual harassment (this was based on the data that we<br />
got and the feedback from the field), a lot of people say harassment<br />
is because of the way people are dressed, or harassment is because<br />
people are not educated. We noticed that this isn’t held up by the<br />
data, so we made a campaign that said, “If harassment is because<br />
of how women dress, then why are veiled women and women who<br />
wear niqab harassed?” “If harassment is because people are not<br />
educated, then why are university professors harassing?” We’ve had<br />
several messages and they went completely viral.<br />
Even though we can’t measure the exact amount of people who<br />
saw this because of the way Facebook works, we do have some<br />
idea on the direct shares. But also anecdotal things like the Muslim<br />
Brotherhood took our campaign, took our logo off and put their logo<br />
on, and started sharing with their network, which is amazing for us.<br />
We love it.<br />
The idea that this campaign resonated and spread way beyond<br />
our own networks is a real success for us. So we are weak on the<br />
numbers, but we have a lot of qualitative or anecdotal feedback from<br />
people.<br />
Q8. It’s obvious that HarassMap is very inspirational; it’s going<br />
global. Can you tell us a little bit about how it’s going global,<br />
how that interest started and what support do you give for<br />
countries or communities outside Egypt that are thinking of<br />
replicating HarassMap?<br />
We got our first request early on; it came a few months after we<br />
launched in early 2011. We realized very early on that a program like<br />
this has to be crafted by people locally. It can’t be something that<br />
was designed for Egypt and then applied in Canada without any<br />
changes or adaptation.<br />
We rely on people taking control over their own replication. So there<br />
is support that we give them, but it is really limited to coaching. There<br />
have been 25 other countries that have contacted us so far. Usually<br />
it starts with sharing our information or anything we have written.<br />
Then setting up time for a Skype coaching session, and I do that. I<br />
answer any of their questions, I tell them about the challenges that<br />
we had, the things that we do differently, what harassment is like<br />
here.<br />
185 Facebook has introduced a feature that allows one to see the number of times<br />
an item or article was shared by others as long as the “shared” button was used.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 91<br />
And how we planned our program, how it’s very important to have<br />
the online component, but also a strong offline component, and what<br />
needs to be done in order to prepare for that. What needs to be done<br />
to answer people’s questions about what happens after they send<br />
a report, or why they should send a report. To think through all of<br />
these issues and to brainstorm about planning their local program,<br />
because harassment and assault look different in different countries.<br />
Then I put them in touch with anyone who can help them. Ushahidi<br />
has been a wonderful support. They coach people as well on setting<br />
up the tech platform. FrontlineSMS can also help people. And<br />
also create a community so they can talk to each other and share<br />
experiences. I stay in touch with them in case they decide to give<br />
me questions later on. We would like to develop this better in the<br />
future, so we would be able to share best practices or brainstorm<br />
together and share experiences in a more systematized way. But this<br />
is something that we haven’t had the time to develop because we<br />
focus mostly on Egypt.<br />
CRISIS MAPPING<br />
3
92<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Fareed Zain: Sudan Vote Monitor<br />
The very first time the Sudanese civil society attempted to use crisis<br />
mapping was during the April 2010 elections and for purposes of<br />
observing and monitoring the elections. Through what was then<br />
called the Sudan Vote Monitor, a Ushahidi-based platform was set<br />
up to receive information via SMS text, email and an online form. It’s<br />
noteworthy to mention that this was the first time Sudan was having<br />
national elections in 24 years and hence, Sudanese citizens, not only<br />
inside Sudan, but also in the diaspora were anxious to lend a hand.<br />
We spoke to Fareed Zain, an IT professional and the mind behind<br />
the Sudan Vote Monitor, who at the time was living in the US and still<br />
resides there. He acted as the technical architect for the project. 186<br />
Q1. Can you tell us about your technical/professional<br />
background and why you thought this Ushahidi-based<br />
platform or the Sudan Vote Monitor was a relevant solution<br />
at the time?<br />
I am an IT professional, that’s what I do for a living, and that is what<br />
I came to America to do. I work as an IT manager for a major oil<br />
and gas company. I was basically looking for ways to help the first<br />
election in Sudan to go well and have chances of success. And I was<br />
looking for technologies because that is the area that I know best<br />
and where I can use my own skills to lend a hand.<br />
Through my research about crisis mapping and using SMS<br />
technology to help civil society organizations, my objective was how<br />
to help civil society organizations from far away, since I live in the US.<br />
186 www.sudaninstitute.org.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 93<br />
When I learned about the Ushahidi platform I did some research, and<br />
I was convinced that this is the right tool that we needed so we could<br />
help the civil society do what they do best [during the elections].<br />
Q2. Since the experts I have talked to so far tell me that a small<br />
part of the work of crisis mappers is about the technology<br />
and a much bigger part is about the outreach on the ground<br />
and verifying the credibility of the information you receive,<br />
can you tell us about the partnerships with the Sudanese civil<br />
society in Sudan and what role they played?<br />
Our role was to support the civil society, so we were not the ones<br />
doing the heavy lifting; that was done by the people on the ground.<br />
Our role was to use technology as an enabler in order to improve<br />
their chances of success and that is what Ushahidi gave us. It is a<br />
technology that is familiar and that people can adopt quickly. SMS is<br />
obviously [a technology] around the world that has been successfully<br />
used for many applications.<br />
So what we did is, we tried to help civil society, both in Sudan<br />
and South Sudan. In the North the civil society organization that<br />
we partnered with is called Asmaa Society for Women, and in<br />
South Sudan it was the Community Empowerment for Progress<br />
Organization (CEPO).<br />
They were already certified election monitors, so they had people on<br />
the ground and they were doing election monitoring and reporting<br />
using paper forms. We came in and took the paper forms that they<br />
had and then developed the online reporting system, and gave them<br />
the SMS codes that they can use to send us messages. Then we<br />
developed the website and the whole reporting mechanism. We<br />
acted as an enabler, but all the work was done on the ground by the<br />
civil society. We trained them on how to use the technology, how to<br />
report, and how to send us reports.<br />
CRISIS MAPPING<br />
3<br />
Q3. What were the biggest challenges both from the technical<br />
side and from the aspects linked to the environment in Sudan,<br />
be it social, political or cultural?<br />
From the technology side there were huge challenges and because<br />
this is the first time this was done in Sudan we ran into issues that<br />
people haven’t experienced before. One of the biggest challenges<br />
we ran into was getting the SMS short codes. In SMS there is a<br />
technology called short codes which is a 5- or 8-digit code that you<br />
give to whomever wants to send you these coded messages. That<br />
code has to be gotten from the telecom operators, so we had to go<br />
and find the telecom operators. We ended up doing that through<br />
Zain and securing the access to the short codes, then paying for it.<br />
Getting the infrastructure set up was a big challenge because they<br />
were never asked to do something like this before. We worked with
94<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
a company in South Africa, which develops software that takes the<br />
short codes from the telecom operators and aggregates it into the<br />
back end, so that we can take it from there and report it on our<br />
website. We had to find another aggregator, where they sell these<br />
short codes, because in the case of Sudan they were not already<br />
there; we had to bring them in and introduce them to Zain and<br />
facilitate that process.<br />
That was on the technical side. On the ground the big challenge<br />
was introducing the concept, as well as mobilizing enough people<br />
to the remote sites. Sudan is very remote and spread out, so getting<br />
people mobile phones so they can report from wherever they have<br />
to be was a logistical challenge.<br />
We also had a special challenge with security because, in the 2010<br />
elections, [monitoring] was not something that was welcomed by the<br />
government. In fact on the second day of monitoring our website<br />
was shut down, and we had to go through all kinds of technical back<br />
doors to get it back online again.<br />
Q4. What would you do differently if you were to repeat this<br />
experience, say for the next elections in 2015?<br />
We would mobilize early and we would secure the short codes early,<br />
so we could give the [election] monitors the resources they need. We<br />
would need to provide them with enough mobile phones so they can<br />
report from where they are. We would train them. We would also use<br />
some sort of technology to mask out their numbers, so they’re not<br />
easily detected or risk disclosing their identity. We would mobilize the<br />
largest number of monitors that we can and train them early.<br />
Overall we proved that the technology works and that the civil society<br />
can adopt it quickly as well as the public. Once we publicized, at<br />
short notice people were able to pick it up. From my perspective it<br />
was a very successful undertaking.<br />
Q5. From what you’re saying, if people are interested to<br />
use crisis mapping for the next elections, starting early and<br />
planning early is key to its success?<br />
Absolutely. That is the key, as well as partnering with a large number<br />
of civil society [organizations], because civil society is where the<br />
rubber meets the road, as they say. They are already on the ground,<br />
so partnering with a representative number of civil society [groups]<br />
and giving them the resources they need to deploy their monitors is<br />
vital. That all takes planning and starting early, which is key.
CHAPTER 4<br />
Crowdfunding<br />
CROWDFUNDING<br />
4
96<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CHAPTER 4<br />
Crowdfunding<br />
This chapter takes a look at crowdfunding, and<br />
gives examples of the wide array of crowdfunding<br />
platforms that have emerged since the tremendous<br />
success of Indiegogo and Kickstarter that were<br />
launched in 2008 and 2009 respectively.<br />
The advantages of crowdfunding over targeting a few individual donors are<br />
discussed; and the concept of “civic crowdfunding” is introduced, along with<br />
a discussion on emerging trends in crowdfunding. The challenges related<br />
to crowdfunding faced by countries under US comprehensive sanctions are<br />
also presented and solutions are proposed.<br />
The chapter focuses on the two largest crowdfunding platforms, Kickstarter<br />
and Indiegogo, providing a detailed comparison to help users make a sound<br />
decision on which platform to use. A case study of Nafeer, the youth-based<br />
humanitarian initiative that was established to respond to the floods that hit<br />
Sudan in August 2013, is presented to showcase how crowdsourcing (in<br />
the form of both crisis mapping and crowdfunding) was used during that<br />
national emergency.<br />
We move on by giving tips and essential steps on how to run a successful<br />
crowdfunding campaign. The chapter wraps up with an interview with one<br />
of the team members who executed the OUR SUDAN short film project,<br />
which used Kickstarter to fundraise. Their experience and the challenges<br />
they faced are shared.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 97<br />
A basic introduction to<br />
crowdfunding<br />
The decentralized nature of the internet and the rise of social media have<br />
revolutionized and democratized the way citizens around the world are<br />
fundraising. These online fundraising efforts are often happening outside the<br />
constraints and rigid hierarchy of institutions and traditional donors by using<br />
the power of local and global networks to get financial support for projects<br />
and ideas.<br />
Crowdfunding, 187 defined as the collection of small and individual donations<br />
from the “crowd” via online platforms, is historically an old practice, rooted in<br />
collective action. Hence, crowdfunding exists as a traditional offline practice<br />
in many cultures from Africa to Latin America. 188 However, it is only since<br />
2008/2009 that it has become a global phenomenon and an industry that<br />
was worth USD 5 billion in 2013 (according to the Crowdfunding Industry<br />
Report 189 ). This is thanks to the unparalleled popularity of companies like<br />
Kickstarter, 190 an online crowdfunding platform that specifically caters to<br />
crowdfunding for creative projects and whose three founders all came from<br />
creative arts backgrounds.<br />
In the case of non-profit organizations and non-institutional civic initiatives,<br />
utilizing online crowdfunding platforms has several advantages. It:<br />
1. Allows a diversification of the donor pool.<br />
2. Permits fundraising based on locally identified needs that is not led<br />
by donor agendas or priorities.<br />
3. Reduces administrative paperwork linked to reporting back to donors,<br />
which often drains the energy of small local civic organizations.<br />
4. Increases the potential of engaging diaspora communities from the<br />
global south in participating in civic or citizen-led initiatives in their countries<br />
of origin, initiatives that they would not easily have known about otherwise.<br />
(See the case study on page 109 from Sudan on the Nafeer campaign.)<br />
5. Increases the agency of citizens organizing collectively at a community<br />
or grassroots level and outside the boundaries of institutions, by giving<br />
citizens access to funds while retaining ownership over their projects.<br />
CROWDFUNDING<br />
4<br />
187 http://en.wikipedia.org/wiki/Crowd_funding.<br />
188 Rodrigo Davies. The Digital Pollada, or What I learned About Crowdfunding from<br />
Peruvian Chicken. April 28, 2014.<br />
189 http://www.crowdsourcing.org/editorial/2014cf-the-crowdfunding-industryreport/25107.<br />
190 https://www.kickstarter.com.
98<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
6. Institutionalizes the fundraising process by providing a platform<br />
that is centralized and transparent, permitting multiple actors such as<br />
businesses, government agencies, non-profits, citizens and donors/<br />
supporters to participate simultaneously.<br />
Since it was founded, Kickstarter has raised more than USD 1.7 billion and<br />
successfully funded over 85,000 projects globally. 191 This included more<br />
than USD 200 million raised for film and video projects alone. 192 Some of<br />
those films went on to win awards and Oscar nominations, such as the<br />
short documentary Inocente.<br />
Kickstarter statistics 193<br />
2012<br />
YEAR<br />
2013<br />
YEAR<br />
$319,000,000<br />
pledged<br />
2,200,000<br />
backers<br />
KICK<br />
$480,000,000<br />
pledged<br />
3,000,000<br />
backers<br />
18,109<br />
Projects<br />
STARTER<br />
19,911<br />
Projects<br />
177<br />
Countries<br />
$606.76<br />
Pledges per minute<br />
214<br />
Countries<br />
$915<br />
Pledges per minute<br />
source: https://www.kickstarter.com/year/2012<br />
source: https://www.kickstarter.com/year/2013<br />
There is also the all-encompassing, very popular and international<br />
crowdfunding platform, Indiegogo, 194 which caters to anything from<br />
creative and artistic projects to technological innovations and humanitarian<br />
causes. It offers more flexible fundraising requirements than Kickstarter (see<br />
comparison on pages 106 and 107).<br />
Indiegogo and Kickstarter have similar funding models, which involve<br />
charging project creators a 4 to 5 percent platform fee, and an additional<br />
2 to 3 percent for electronic payment processing. This funding model is<br />
common to many crowdfunding platforms around the world.<br />
191 https://www.kickstarter.com/help/stats?ref=footer.<br />
192 Kickstarter Blog. Michael McGregor. A big day for film. March 14, 2014.<br />
193 https://www.kickstarter.com/year/2012 and https://www.kickstarter.com/year/2013.<br />
194 https://www.indiegogo.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 99<br />
After Indiegogo and Kickstarter were founded, many crowdfunding<br />
platforms have come into existence, catering to a plethora of interests and<br />
needs. 195 Some are very specific and geographically localized, such as<br />
DonorsChoose, 196 an online platform where ordinary citizens can directly<br />
choose to fund school projects (in the United States) initiated by public<br />
school teachers. It has included crowdfunding for field trips, books, and<br />
school supplies, amongst other things. DonorsChoose was founded by a<br />
school teacher in 2000, and is considered one of the earliest examples of<br />
online crowdfunding.<br />
For projects that are unable to find a suitable home on existing platforms,<br />
it is possible to host an online crowd fundraiser on a personalized platform<br />
such as the open source crowdfunding platform Selfstarter. 197 However,<br />
to use this you will need to have web design and programming skills, as<br />
well as an existing support network. Such support networks, which provide<br />
automatic marketing and a donor base, are an advantage for small to<br />
medium-sized projects, and are readily found in the more accomplished<br />
crowdfunding platforms that have communities of followers and a high<br />
level of trust attached to them. Some of the advantages that go with a<br />
customized crowdfunding platform or website include:<br />
1. No fees linked to using the platform.<br />
2. The focus is on your project and not the platform that you are using.<br />
3. You get to control the user experience by controlling the design and<br />
layout of your website.<br />
4. You can get access to a larger array of metrics or analytical data<br />
linked to your fundraising campaign than traditional crowdfunding platforms<br />
would provide. 198<br />
CROWDFUNDING<br />
4<br />
195 TriplePundit. Crowdfunding Platforms: What You Should Know. June 25, 2013.<br />
196 http://www.donorschoose.org.<br />
197 http://selfstarter.us.<br />
198 TechCrunch. Vikas Gupta. A Look At Play-i’s Successful Crowdfunding Campaign.<br />
April 26, 2014.
100<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Trends in crowdfunding and the<br />
rise of civic crowdfunding<br />
The increased specialization of crowdfunding platforms is one obvious trend<br />
that has emerged in recent years. For example, some platforms, such as<br />
Causes, 199 Razoo 200 and CrowdRise 201 are dedicated to supporting the<br />
causes of non-profit organizations and/or charities. Others cater to personal<br />
and group projects, such as tuition, medical expenses or even planning<br />
parties. Examples include Tilt, 202 GoFundMe, 203 Zokos, 204 and YouCaring. 205<br />
It gets even more specific with platforms such as Experiment, 206 which<br />
supports crowdfunding for scientific research and innovations.<br />
Crowdfunding platforms are also becoming localized and are starting to<br />
slowly appear outside the United States and Europe in the global south.<br />
This is mainly because local contexts matter and challenges such as<br />
language and currencies can be addressed by locally-based platforms. It<br />
is also because research has shown that the location of communities is<br />
closely linked to who actually uses online crowdfunding platforms; and that<br />
those who use crowdfunding platforms the most tend to live in the cities<br />
where those platforms are headquartered. 207<br />
Examples of crowdfunding platforms from the Middle East 208 region include<br />
Yomken. 209 Founded in 2013 and headquartered in Egypt, it supports small<br />
industrial workshop owners (glassblowers, mechanics, etc.), by linking them<br />
with problem solvers and innovators, as well as investors. There is also<br />
Aflamnah 210 (founded in June 2012) which is based out of Dubai in the UAE<br />
and caters to filmmakers from the Middle East region. Also based out of<br />
the UAE and founded in mid-2013 is Eureeca, 211 which is a crowdinvesting<br />
platform that links small- and medium-sized entrepreneurs to investors and<br />
retailers who want to support new business ideas.<br />
199 https://www.causes.com.<br />
200 http://www.razoo.com.<br />
201 http://www.crowdrise.com.<br />
202 https://www.tilt.com.<br />
203 http://www.gofundme.com.<br />
204 http://www.zokos.com.<br />
205 http://www.youcaring.com.<br />
206 https://experiment.com.<br />
207 Rodrigo Davies. The Digital Pollada, or What I learned About Crowdfunding from<br />
Peruvian Chicken. April 28, 2014.<br />
208 The National. Neil Palmer. Crowdfunding in Mena region finally starts to take off.<br />
May 5, 2014.<br />
209 http://yomken.com/?lang=en.<br />
210 http://www.aflamnah.com.<br />
211 http://eureeca.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 101<br />
In Latin America, popular crowdfunding platforms include the Brazilian site<br />
Catarse 212 that supports creative projects. It was the first crowdfunding<br />
platform to make its platform’s code open source and therefore available for<br />
others to copy or build upon. To date, at least 10 crowdfunding platforms<br />
have been built using Catarse’s code.<br />
Crowdfunding that specializes in creating a shared public good or a service<br />
to a community is sometimes referred to as civic crowdfunding. 213 Examples<br />
include creating green spaces or parks, renovating playgrounds, building<br />
community centers, or organizing cultural festivals. Some experts argue<br />
that crowdfunding generally, and civic crowdfunding specifically, is a form<br />
of self-management that citizens are moving toward, and that it is replacing<br />
the work of governments and shifting the responsibility and risks of State<br />
institutions to individuals, especially at times of economic strain. Civic<br />
crowdfunding also allows individuals to have ownership over their projects,<br />
and lets them take more responsibility and risk that in the past used to be<br />
concentrated in the hands of institutions.<br />
Rodrigo Davies, who is an expert in civic crowdfunding, argues that civic<br />
crowdfunding is also institutionalizing the process of crowdfunding by<br />
creating centralized and transparent mechanisms that permit the creation<br />
of diverse partnerships, such as the intersection of crowdfunders with the<br />
private sector, public sector and civic communities. He says:<br />
Therefore we might say that the optimal form of civic crowdfunding<br />
occurs at the intersection of all four interests, with each<br />
contributing to the outcome. That is to say, the ‘perfect crowd’<br />
for a civic project involves all actors, since public projects in the<br />
built environment that serve civic goals will impact or intersect with<br />
the interests of government, for-profit and nonprofit organizations,<br />
and the crowd. 214<br />
Spacehive, 215 the first online crowdfunding platform that caters to civic<br />
projects (launched in 2012), does exactly that by bringing together people<br />
from local communities who have ideas for civic projects with businesses,<br />
government bodies and even design professionals who want to invest in<br />
these projects. Spacehive also works with grant-making organizations to<br />
help them set up matching-funding schemes 216 for projects they want to<br />
support. The platform is London-based, and supports only communities<br />
in the United Kingdom, but its model has inspired the spreading of the<br />
CROWDFUNDING<br />
4<br />
212 https://www.catarse.me.<br />
213 Rodrigo Davis. Is Crowdfunding Participatory Citizenship or a Sign of Institutions<br />
in Decline? March 23, 2014.<br />
214 Rodrigo Davis. What’s civic about civic crowdfunding? December 3, 2013.<br />
215 http://spacehive.com.<br />
216 https://spacehive.zendesk.com/hc/en-us/articles/201812067-I-want-tomatch-fund-projects.
102<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
idea of online civic crowdfunding to the United States. Examples include<br />
Citizinvestor 217 and Neighbor.ly. 218<br />
Both Citizinvestor and Neighbor.ly approve project ideas from citizens only<br />
if they have been backed by their local municipality or city hall. 219 However,<br />
both platforms do permit citizens to propose projects. In the case of<br />
Citizinvestor the focus is on small-sized projects (USD 10,000- 20,000). 220<br />
Once a citizen’s petition reaches its funding goal, Citizinvestor goes the<br />
extra mile by introducing citizens who initiated the petition to the appropriate<br />
people in their city municipality. This model of online civic crowdfunding<br />
platforms clearly demands a more hands-on approach by the platform<br />
owners who are required to vet projects and build relationships with local<br />
governments and businesses.<br />
217 http://www.citizinvestor.com.<br />
218 https://neighbor.ly.<br />
219 TechPresident. Miranda Neubauer. Three Kickstarter-Inspired, Civically Minded<br />
Crowdfunding Sites. July 31, 2012.<br />
220 Mashable. Kenneth Rosen. Citizinvestor Helps Grab the Ears of Local<br />
Governments. September 18, 2012.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 103<br />
Crowdfunding for countries under<br />
US sanctions<br />
It is important to do your research before embarking on an online<br />
crowdfunding campaign. Most crowdfunding platforms have a support desk<br />
where you can send questions and ask for help and advice even before you<br />
launch your project. This is particularly true of the more reputable, sizable<br />
and international crowdfunding platforms such as Kickstarter and Indiegogo.<br />
These platforms also have online resources, such as the Kickstarter Creator<br />
Handbook. 221<br />
If your project is linked in any way to a country under US comprehensive<br />
sanctions (i.e. Cuba, Iran, North Korea, Sudan and Syria) and you are<br />
contemplating the use of an American crowdfunding platform, it is imperative<br />
that you contact the support desk and make them aware of your fundraising<br />
campaign and get their approval before you launch.<br />
However, do not expect these companies to know the sanctions regime<br />
pertaining to your country. It is your job to know all exemptions under US<br />
sanctions law and to make the relevant arguments to support your project.<br />
All documents related to the sanctions regime can be found on the website<br />
of the Department of Treasury. 222<br />
CROWDFUNDING<br />
4<br />
221 https://www.kickstarter.com/help/handbook.<br />
222 http://www.treasury.gov/resource-center/sanctions.
104<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
In the case of Sudan, the sanctions exemptions include any projects to<br />
be implemented in: “Southern Kordofan/Nuba Mountains State, Blue Nile<br />
State, Abyei, Darfur, and marginalized areas in and around Khartoum –<br />
referred to as ‘the Specified Areas of Sudan.’” 223<br />
The main obstacle facing the use of crowdfunding in US-sanctioned<br />
countries is the inability to conduct any commercial transactions online,<br />
since the use of credit cards is restricted and the transfer of funds from the<br />
US to Sudanese banks or to individuals inside Sudan is also prohibited.<br />
However, Sudanese civil society groups have successfully used online<br />
crowdfunding in the last couple of years. Examples include creative<br />
projects such as the short film OUR SUDAN, 224 as well as development or<br />
humanitarian projects such as the reconstruction of Al Huda School, which<br />
gives free basic education to 230 internally displaced students from the Nuba<br />
Mountains. 225 In both cases the main requirement was to have members of<br />
the Sudanese diaspora involved so that a bank account associated with the<br />
fundraising campaign could be opened in a non-sanctioned country.<br />
Moreover, Sudanese civil society groups have also succeeded in<br />
crowdfunding by appealing to diaspora communities through social media<br />
and organizing transfer of funds to individual bank accounts that are then<br />
sent to Sudan (see case study on Nafeer below).<br />
Although Sudan does not yet have an official mobile money platform, such<br />
as M-Pesa, 226 which is popular in Kenya and other parts of East Africa,<br />
transferring funds via mobile phone credit is becoming more accepted<br />
around the country. It is increasingly common for the general population<br />
and members of civil society to transfer funds by sending mobile phone<br />
credit to a cell phone for exchange into cash. This looks like a good option<br />
for in-country, offline crowdfunding activities, given the restrictions on credit<br />
card use under the US sanctions, which limit the use of American online<br />
crowdfunding platforms. However, transferring funds via phone credit<br />
also has the disadvantage of not being as transparent, outreaching and<br />
centralized as an online platform.<br />
223 Department of the Treasury. Office of Foreign Assets Control. Sudan Sanctions<br />
Program. Updated November 5, 2013.<br />
224 YouTube. Northernlightist. OUR SUDAN. June 6, 2013.<br />
225 Indiegogo. Campaign. Dalia Haj-Omar. Support Nuba Mountain IDP Students.<br />
December 13, 2013-January 19, 2014.<br />
226 https://en.wikipedia.org/wiki/M-Pesa.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 105<br />
Choosing a crowdfunding platform<br />
Indiegogo vs. Kickstarter<br />
Indiegogo and Kickstarter are the most popular online crowdfunding<br />
platforms. Although at first glance they may look similar, there are<br />
fundamental differences. Both platforms offer a huge community of users<br />
and high credibility; and both require that those initiating a project choose<br />
a funding goal as well as a deadline and a media pitch for the fundraising<br />
campaign. Additionally, those who start projects on the two platforms have<br />
100 percent ownership over their projects. But beyond these similarities<br />
there are important differences that include: (1) the fundraising model<br />
(an all or nothing approach with Kickstarter versus a flexible model with<br />
Indiegogo); (2) the types of projects that can be funded; (3) the processing<br />
fees; and (4) perks or rewards to supporters. The table on the next page<br />
compares and captures in more detail the differences between Indiegogo<br />
and Kickstarter based on those four categories.<br />
Although some people may turn away 227 from using Kickstarter because of<br />
its “all or nothing” crowdfunding model, the company defends that approach<br />
by stressing that it is motivating and will make people work hard at spreading<br />
the message and seeking support for their projects. 228 They add that to date<br />
44 percent of projects on the Kickstarter platform have been funded. It also<br />
makes more sense to go for an “all or nothing” crowdfunding option if your<br />
project cannot be implemented unless it meets the set goal. If that’s not the<br />
case because, for example, you are seeking funds both online and offline to<br />
meet your goal or you do not need to meet your goal to launch your project,<br />
then a flexible crowdfunding option may be more suitable for you.<br />
Finally the insistence on a physical reward/perk may be a problem in countries<br />
where the postal service is poor, non-existent or unreasonably expensive,<br />
as is the case in many developing countries. Going with Indiegogo’s more<br />
flexible model that allows you to skip on offering rewards to your backers<br />
might be an advantage in this case. Another option is to choose perks that<br />
are memorable but non-physical, such as an invitation to an event or a<br />
Skype chat with the project creator.<br />
CROWDFUNDING<br />
4<br />
227 ZDNeT. Ken Hess. Despite its popularity, I hate Kickstarter. November 22, 2013.<br />
228 https://www.kickstarter.com/help/faq/kickstarter+basics?ref=faq_<br />
subcategory#Kick.
106<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Comparison between Indiegogo and Kickstarter229230231232<br />
Indiegogo<br />
1. A flexible model of fundraising. You<br />
can choose a fixed funding approach<br />
where you only receive the funds<br />
collected if you reach your fundraising<br />
goal; or a flexible funding approach<br />
where you collect all funds raised<br />
even if you do not reach your goal.<br />
Note that processing fees are<br />
higher for the flexible fundraising<br />
choice (see below under “fees” for<br />
more details).<br />
2. What is funded? There are no<br />
restrictions to the type of projects<br />
funded as long as projects do not<br />
violate Indiegogo’s terms of use. 229<br />
Kickstarter<br />
1. An all or nothing fundraising model.<br />
You have to meet your indicated goal<br />
to receive the donations raised. If you<br />
do not meet your goal all funds are<br />
returned to their donors, and you are<br />
charged nothing. Kickstarter says<br />
that 44 percent of all projects in its<br />
platform get funded.<br />
2. What is funded? Kickstarter restricts<br />
the use of its platform to concrete<br />
creative projects under the categories<br />
of: art, comics, design, fashion,<br />
film, food, music, photography,<br />
publishing, technology and theatre.<br />
Recently Kickstarter added two new<br />
categories, 230 journalism and crafts,<br />
in addition to 94 subcategories. 231<br />
You cannot start your project before<br />
getting an approval from Kickstarter.<br />
More is explained in the “Our Rules”<br />
section of the website. 232<br />
229 https://www.indiegogo.com/about/terms.<br />
230 Kickstarter Blog. Introducing Two <strong>New</strong> Categories: Journalism and Crafts. June<br />
11, 2014.<br />
231 Kickstarer Blog. A subcategory for everything. April 18, 2014.<br />
232 https://www.kickstarter.com/rules.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 107<br />
Indiegogo<br />
3. Fees. If you meet your funding goal<br />
Indiegogo charges 4 percent of all<br />
funds collected regardless of whether<br />
you chose a fixed funding or flexible<br />
funding campaign. Non-profits based<br />
in the US pay 3 percent. If you do not<br />
meet your funding goal, for a flexible<br />
funding campaign, Indiegogo collects<br />
9 percent of all funds raised; with<br />
a fixed funding campaign you get<br />
nothing and all donations are returned<br />
to funders. Add to this amount credit<br />
card processing fees that can range from<br />
3 to 5 percent. For more details check<br />
out the “fees and pricing” page. 233<br />
4. Perks or rewards. Indiegogo gives<br />
its users the option of opting out<br />
of offering a perk, but they also<br />
encourage users of their platform<br />
to create perks and say that,<br />
“campaigns offering perks raise 143<br />
percent more money than those<br />
that do not. Perks help you attract<br />
a larger audience, make people feel<br />
more valued for their contributions,<br />
and help you spread the word about<br />
your campaign.” 235 They define perks<br />
as “nonmonetary incentives that<br />
campaigners offer in exchange for<br />
your contribution.” 236<br />
233234235236<br />
Kickstarter<br />
3. Fees. Kickstarter collects a<br />
5 percent fee applied to all funds<br />
collected, in addition to a 3 to 5<br />
percent credit card processing fee. 234<br />
4. Perks or rewards. Kickstarter<br />
requires that all its users offer rewards<br />
as incentives to donors/backers.<br />
They emphasize that, “every project’s<br />
primary rewards should be things<br />
made by the project itself”, and advise<br />
keeping prices at a reasonable level.<br />
Rewards can also be in the form<br />
of “creative experiences,” such as<br />
invitations to the set during filming a<br />
movie, or a public acknowledgement,<br />
or even writing a personal thank you<br />
note or post card.<br />
CROWDFUNDING<br />
4<br />
233 https://support.indiegogo.com/hc/en-us/articles/204456408-Fees-Pricing.<br />
234 https://www.kickstarter.com/help/fees.<br />
235 http://go.indiegogo.com/playbook/life-cycle-phase/setting-up-your-campaign.<br />
236 http://go.indiegogo.com/playbook/contributing.
108<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Comparison: Indiegogo vs. Kickstarter<br />
KICK<br />
STARTER<br />
A flexible<br />
fundraising<br />
model<br />
Dream<br />
Project<br />
funding model<br />
A fixed<br />
fundraising<br />
model:<br />
all or nothing<br />
No restrictions<br />
Humanitarian<br />
Small Business<br />
Creative projects<br />
what is funded<br />
Restricted to<br />
Creative projects<br />
Fixed funding: 4%<br />
or<br />
Flexible funding: 9%<br />
+<br />
Credit card processing: 3-5%<br />
fees<br />
Fees on funds collected: 5%<br />
+<br />
Credit card processing: 3-5%<br />
Optional<br />
Required<br />
perks & rewards
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 109<br />
CASE STUDY 4: SUDAN<br />
The story of #Nafeer:<br />
crowdsourcing in action<br />
During the floods that impacted Khartoum, Sudan’s capital, in August<br />
2013, a youth-based initiative called Nafeer 237 (inspired by the Sudanese<br />
tradition of collectively helping those in need) used a variety of social<br />
media and ICT tools 238 that included Facebook, 239 Twitter, 240 Flickr, 241<br />
and a crisis map. 242 With these tools they mobilized a huge network<br />
of up to 8,000 volunteers who raised funds online and offline, and<br />
provided relief to impacted citizens much faster than the government<br />
and United Nations agencies.<br />
Most of the donations came from Sudanese businesses and diaspora<br />
communities via announcements on Facebook 243 and Twitter 244 in the<br />
form of in-kind and cash donations. The Facebook message 245 below<br />
announcing the need for life jackets and vehicles is an example of the<br />
calls for donations posted on social media. There were also similar<br />
calls for the mobilization of volunteers to specific locations that needed<br />
immediate relief.<br />
CROWDFUNDING<br />
4<br />
237 The <strong>New</strong> York Times. Isma’il Kushkush. As Floods Ravage Sudan, Young<br />
Volunteers Revive a Tradition of Aid. August 29, 2013.<br />
238 Pambazuka <strong>New</strong>s. Mobilization in the age of parallel media. September 12,<br />
2013.<br />
239 https://www.facebook.com/gabaileid.<br />
240 Twitter. @NafeerCampaign.<br />
241 Flickr. Nafeer Sudan.<br />
242 https://khartoumflood.crowdmap.com.<br />
243 https://www.facebook.com/photo.php?fbid=553885294658675&set=<br />
a.551661601547711.1073741828.551549528225585&type=1<br />
244 https://twitter.com/NafeerCampaign/status/372129849730957312.<br />
245 https://www.facebook.com/NafeerInitiative/posts/552400651473806
110<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
The majority of the volunteers on the ground were not the traditional<br />
civil society crowd. Many were professionals who came from the private<br />
sector and had useful technical skills that are usually lacking in a typical<br />
civil society organization. Nafeer had its own engineering and medical<br />
teams. A Crisis Map, 246 for example, was created by a young female<br />
software engineer while she was trapped in her house during the heavy<br />
rains. The map was eventually used by Nafeer, NGOs and the United<br />
Nations to locate the most needy areas for relief. Even the government’s<br />
Civil Defence “hotline” was referring people to Nafeer.<br />
Nafeer, however, did face some technical challenges linked to the<br />
impact of US sanctions on free access to the internet. Nafeer’s<br />
members were unable to use a more centralized online crowdfunding<br />
platform because PayPal closed Nafeer’s account, citing the sanctions<br />
on Sudan. In a tweet referring to operational obstacles that the mayor<br />
of Khartoum was creating for the group, Amjad Fareed, one of the<br />
initiators of Nafeer, said:<br />
The Americans closed #Nafeer’s PayPal account because of<br />
the sanctions on Sudan. What challenges are we supposed<br />
to deal with, those from the Mayor of Khartoum or from the<br />
Americans? 247<br />
246 The Daily Beast. Amanda Sperber. Crowdsourcing Help for Flooded Sudan.<br />
August 15, 2013.<br />
247 https://twitter.com/amjedfarid/status/370239060427550720.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 111<br />
US sanctions made the collection of funds from diaspora groups much<br />
more burdensome, since it was not possible to streamline the process<br />
and centralize it in one place. Multiple account numbers of diaspora<br />
focal points (mainly in the Gulf, Europe and the United States) were<br />
posted on Twitter and Facebook for those willing to donate. Despite this<br />
decentralization challenge, Nafeer members continued to make public<br />
all the funds donated via their Facebook page. 248 This created a new<br />
model of transparency for civil society, regardless of the challenge of<br />
tracking donations that came from many countries and were sent to<br />
multiple bank accounts of members of the diaspora.<br />
The Nafeer campaign marked the first time crowdfunding was<br />
attempted in Sudan during a national humanitarian crisis. Since then<br />
there have been several crowdfunding efforts by civil society, not all<br />
linked to developmental or relief efforts. They required that Sudanese<br />
in the diaspora assist with linking the crowdfunding page with a bank<br />
account in a non-sanctioned country. 249<br />
CROWDFUNDING<br />
4<br />
248 https://www.facebook.com/photo.php?fbid=122169817953591&set=<br />
pb.121094181394488.-2207520000.1387320960.&type=3&theater.<br />
249 http://www.kickstarter.com/projects/1551224532/our-sudan-a-short-film-toinspire-a-new-generation?ref=live.
112<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Photo taken of volunteers during the “paint and run” school renovation campaign<br />
led by the Sudanese youth group Education Without Borders, December 2012.<br />
How to run a successful<br />
crowdfunding campaign<br />
Most crowdfunding platforms have tips 250 on their websites to help you set<br />
up your campaign. 251 However, as mentioned before, crowd fundraising<br />
is not a new concept; the internet has just made it more accessible to<br />
everyone. Hence, some of the traditional tips for fundraising that apply offline<br />
also apply online. Crowdfunding is not automatic or easy; be prepared to<br />
work hard at planning before, during and after the launch of your campaign.<br />
Below are some essential steps you need to take: 252<br />
• Invest in building a community of supporters long before you launch<br />
a fundraising campaign. Have a monthly newsletter that goes to all your<br />
networks. <strong>Use</strong> social media to expand the reach of your network and to<br />
communicate your successes and share your work. Engage with your<br />
audience and invite them to your events.<br />
• Create a crowd fundraising campaign team. Campaigns led by a<br />
team get more donations than those led by individuals.<br />
• Set specific, time-bound and realistic objectives. Your supporters<br />
need to have a concrete idea about how their donations will be used.<br />
Indicate three to four clear and measurable objectives.<br />
• Your fundraising monetary goal needs to be realistic and conservative.<br />
To calculate it, do an actual cost analysis of how much you need to<br />
250 https://support.indiegogo.com/hc/en-us/articles/204458068-Checklist-Before-<br />
Creating-A-Campaign.<br />
251 https://www.kickstarter.com/help/handbook#defining_your_project.<br />
252 CrowdFundBeat. Ben Lamson. How to Successfully Crowdfund for Your<br />
Nonprofit. November 14, 2013.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 113<br />
13 steps to running a<br />
crowdfunding campaign<br />
13 steps to running a crowdfunding campaign<br />
1. Build a community of supporters<br />
2. Create crowdfunding team<br />
3. Set clear and time-bound objectives<br />
4. Set a realistic monetary goal<br />
5. Decide length of campaign<br />
6. Prepare a media pitch<br />
7. Pick an image and a title<br />
8. Have a soft launch<br />
9. Spread the word<br />
10. Reach donors online and/or offline<br />
11. Thank your backers<br />
12. Update your supporters<br />
13. Capture lessons learned<br />
• implement your project; then look at the size of your network of “real”<br />
supporters. Indiegogo advises that you should plan to get about 30<br />
percent of donations from your direct network and community. 253 Do not<br />
forget to filter in the processing fees of the crowdfunding platform that<br />
you will use, as well as the cost of awards or perks (if you choose to offer<br />
them). Be conservative and choose a minimum funding amount that will<br />
allow you to meet your objectives.<br />
CROWDFUNDING<br />
4<br />
• The length of your campaign should allow you to build momentum<br />
and at the same time engage with your audience for a sufficient amount<br />
of time. Shorter campaigns are usually more effective. Remember that<br />
your campaign will require human resources as well as a lot of follow-up<br />
and interaction with your audience, so 30 days is much more reasonable<br />
than 60.<br />
• Prepare your communication/media pitch. Both Indiegogo and<br />
Kickstarter stress that projects with a video are much more successful.<br />
A video does not have to be expensively produced or of professional<br />
253 http://go.indiegogo.com/playbook/life-cycle-phase/setting-up-your-campaign.
114<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
quality, but make sure that it is short (three to four minutes) and explains<br />
who you are, what you want to do and how. The more personal your<br />
video the better, so try to tell a personal and compelling story – people<br />
often donate because they believe in individuals. Also, write a short<br />
narrative description that you can add below the video and send to your<br />
closest friends and community via email.<br />
• Pick an image and title. Your title should be short and should capture<br />
the essence of your project.<br />
• Do a soft launch. Draw a list of your closest friends and supporters and<br />
contact them before the official launch to ask them to make a contribution<br />
within the first three days. This will help you start above the zero mark.<br />
Building this early momentum will encourage those outside your network<br />
to donate when they see that others have already done so.<br />
• Spread the word. Count on your personal network of friends, family<br />
and professional supporters first and foremost. Prepare email lists and a<br />
description of the project beforehand. Include clear directions on how to<br />
donate and provide a link to your campaign page. <strong>Use</strong> social media to<br />
spread the word and ask your main supporters to share.<br />
• Reach your donors wherever they are. If some of your essential<br />
supporters are shy with using technology to donate, reach them in<br />
the way that is most comfortable for them. Consider hosting an offline<br />
fundraiser to supplement your crowdfunding campaign. Allow supporters<br />
to give via cash or checks or to send credit via text messaging.<br />
• Thanking your backers is key. All crowdfunding platforms send an<br />
automatic confirmation and a thank you message to donors after each<br />
contribution. However, a personal message of gratitude goes a long<br />
way. Some perks include handwritten postcards and thank you notes.<br />
Thanking your donors during the campaign allows you to update them<br />
on how your campaign is doing and to ask them to help out by recruiting<br />
a friend or two and spreading the message to their networks.<br />
• Long-term communication and updates. Once your crowdfunding<br />
campaign is over, plan to send two to three updates during the<br />
implementation phase of your project. They can be short videos or text<br />
supported by photos. Long-term communication after your fundraiser is<br />
done builds credibility with your community and demonstrates impact<br />
that ensures future support.<br />
• Learn and capture lessons. Most crowdfunding platforms have<br />
analytics and metrics to track the progress of your campaign in real time.<br />
You can know things like: the number of people who visited your page;<br />
the geographic location of your backers; how much is being donated<br />
per day; and where the donations are coming from (email solicitations,<br />
Facebook, Twitter, etc.). In Indiegogo, for example, you can also see how<br />
much everyone in your campaign team is raising. Collectively this data<br />
can be used to help you see what outreach strategies are working best,<br />
and what you may need to change for the next time.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 115<br />
Interview:<br />
Crowdfunding for the OUR<br />
SUDAN short film<br />
Sudanese civil society’s creative and artistic efforts are starting to<br />
slowly turn to the internet and specifically to crowdfunding to secure<br />
financial support for projects. Recently, we have especially seen this<br />
in the creation of short films such as OUR SUDAN 254 and Adam &<br />
Howa, 255 which screened at the Cannes Film Festival “2015 Diversity<br />
in Cannes Short Film Showcase,” in May 2015. With Sudan suffering<br />
from US imposed sanctions, Sudanese citizens inside Sudan are not<br />
able to do any financial transactions online. Hence the support of<br />
Sudanese diaspora members with crowdfunding is essential.<br />
Dimah Abdulkarim, who was part of the OUR SUDAN support<br />
team that oversaw the crowdfunding process 256 joined us for this<br />
interview. She is an American-Sudanese, has a background in<br />
international development and peacebuilding, and has been living in<br />
Sudan for the last two years, working as an organizer in supporting<br />
grassroots civil society environmental organizations.<br />
CROWDFUNDING<br />
4<br />
254 YouTube. Northernlightist. OUR SUDAN. June 6, 2013.<br />
255 Kickstarter. Sarra Idris and Mitch Stockwell. Adam & Howa: A short fantasy film<br />
set in Khartoum, Sudan.<br />
256 Kickstarter. The Our Sudan Team. Our Sudan: A Short Film to Inspire A <strong>New</strong><br />
Generation. February 17, 2013.
116<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Q1. Can you explain your role as a recently returning Sudanese<br />
from the diaspora, and the basic requirements that make<br />
crowdfunding technically possible?<br />
In Sudan, I worked with development NGOs, and I’ve participated<br />
in grassroots work on a volunteer basis with organizations working<br />
on environmental issues and peacebuilding. But I quickly realized,<br />
soon after arriving to Sudan and after having become acquainted<br />
with people within my own generation (I’m in my 20s), that Sudanese<br />
young people learn of others with similar interests through online<br />
platforms. They also make contact and mobilize through online<br />
platforms, the biggest being Facebook.<br />
Crowdfunding in Sudan is still not yet developed or extensively<br />
utilized or even realized. Most people here are not familiar with<br />
online opportunities for funding, mainly because crowdfunding sites,<br />
such as Kickstarter or Indiegogo, are developed in countries that<br />
economically sanction Sudan.<br />
So even though in Sudan [there are] great ideas for business<br />
projects, or interesting technological or scientific inventions, or<br />
social enterprise and initiatives, those who are also aware of these<br />
platforms for raising funds online have no easy access to Kickstarter<br />
or Indiegogo or any other online crowdfunding platforms. They<br />
are, unfortunately, not allowed to access established, reliable<br />
crowdfunding sites.<br />
The sole technical requirement to be able to access crowdfunding<br />
sites [from inside Sudan], is to have access to online banking in a<br />
non-sanctioned country, so donors can wire money through their<br />
accounts. Donors must also have non-sanctioned bank accounts,<br />
and as you know Sudan is not one of those countries.<br />
Q2. OUR SUDAN chose Kickstarter as the platform to execute<br />
the crowdfunding. Did you consider or research other<br />
crowdfunding platforms? Why did you choose Kickstarter?<br />
We were simply more familiar with Kickstarter at the time. We<br />
chose Kickstarter because, after looking at some of the other online<br />
crowdfunding options, we decided we simply liked Kickstarter more.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 117<br />
Q3. Was it hard to reach your designated funding goal? Was it<br />
nerve-wracking given that with Kickstarter you have to meet<br />
your goal or more, otherwise you do not collect anything at<br />
all?<br />
The challenges that we faced came in different forms, shapes and<br />
sizes. It was nerve-wracking using Kickstarter. We had to really work<br />
to reach our funding goals. We knew from the onset though that<br />
it wasn’t enough to simply make the video project cool, upload it<br />
to the Kickstarter page, and then sit back and watch the thumbs<br />
rolling. We had to solicit our friends and family by sending emails,<br />
making calls, and redirecting them to our Kickstarter page. We also<br />
created a Facebook page and a Twitter account which generated<br />
visibility for the short film and it sourced a lot of potential individual<br />
donors.<br />
The challenge that we faced was that we wanted to source people<br />
in Sudan as potential donors, we didn’t want to just stick to the<br />
Kickstarter page and the Kickstarter account mode of fundraising.<br />
We attempted other fundraising options. We approached some of<br />
the local businesses here, for instance, for sponsorship and support,<br />
some of whom followed through.<br />
Q4. Can you speak about the challenges you faced – specific<br />
to the technology and also more generally to fundraising?<br />
We have faced challenges, some of which we are still facing actually,<br />
even after the finishing of the filmmaking aspect of the project.<br />
For example, part of the Kickstarter mandate is that people who<br />
give above a certain amount, even a small amount, receive gifts in<br />
exchange for their donations. Our gifts came in the form of t-shirts<br />
and posters and some other merchandise items. The project team<br />
decided that the items must be made in Sudan. Being that we’re<br />
operating in a sanctioned country, we’ve experienced (and still are<br />
experiencing) the difficulty of shipping these items to all 130 of our<br />
donors who are all over the world. It’s not as straightforward as<br />
posting the items from Khartoum and mailing them. Just like we had<br />
to rely on those of us in the project team who have offshore bank<br />
accounts to establish the Kickstarter account, we also have to rely<br />
on those of us who can travel so they can ship these items from a<br />
non-sanctioned country.<br />
CROWDFUNDING<br />
4<br />
This is actually quite heavy; remember we are a small project team.<br />
All of us have full-time jobs. Imagine carrying all this merchandise<br />
with you from Sudan to the UK, in order to mail it to our individual<br />
donors in Canada and the US.
118<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
It is a requirement from Kickstarter that you give gifts to your donors.<br />
The idea is that you incentivize donors to give to a particular project<br />
more money by saying, “Hey, if you give me a dollar, you’ll get a<br />
thanks or a pat on the back maybe. If you give me 10 dollars you<br />
might get a bumper sticker. If you give me 50 you’ll get a t-shirt ...” It’s<br />
like an incentive system with donors to feel gratified in giving. I think<br />
that’s the Kickstarter model. I don’t know if Indiegogo is the same,<br />
or if other crowdfunding sites are necessarily quite as incentivized.<br />
As far as challenges are concerned, regarding the project execution<br />
in Sudan, Sudan is not a country known for its civil rights – in fact<br />
we’re known recently for quite the opposite. The OUR SUDAN<br />
project is essentially a media project, unaffiliated with the State, and<br />
it’s also a not-for-profit project. So we knew what dangers there<br />
were for us in the making of this film and the risks involved in its<br />
message. There were a lot of challenges in that sense that coupled<br />
with the difficulties and obstacles in accessing crowdfunding sites<br />
from a sanctioned country like Sudan.
CHAPTER 5<br />
Digital security<br />
DIGITAL SECURITY<br />
5
120<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CHAPTER 5<br />
Digital security<br />
This chapter is a good start for organized groups or<br />
institutions that want to broaden their discussions<br />
and understanding of digital security, and put in<br />
place practical steps for digital security policies. It<br />
aims to heighten the sensitivity of groups at risk of<br />
targeting because of their online activities to the<br />
importance of digital security by exposing those<br />
groups to global and regional practices and trends<br />
regarding infringements on net freedoms imposed<br />
by State entities.<br />
Groups at risk include journalists, citizen journalists, activists and members<br />
of civil society. This chapter will also point users of this guidebook to useful<br />
resources for safe communication when browsing the internet and when<br />
using mobile devices, in addition to resources for digital activists and<br />
online journalists in need of special assistance during physical or technical<br />
emergencies.<br />
The chapter includes three expert interviews. One interview focuses on the<br />
basic measures of digital protection for those who have never taken steps to<br />
ensure their digital security. The second interview discusses the technology<br />
of “mesh networking” that can be used to connect communities in case of<br />
a network interruption or internet blackout, or in the absence of connectivity<br />
due to poor infrastructure. The final interview is with an active member of<br />
Sudanese civil society who reflects on the challenges facing civil society<br />
when it comes to protecting digital privacy.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 121<br />
Why digital security matters: global<br />
trends and the decline in net<br />
freedoms<br />
The shadow of Edward Snowden’s revelations<br />
It is no longer a contested matter. Today we are living through the lowest<br />
point of optimism when it comes to the transformative power of the internet<br />
since it was first created, a little over a quarter of a century ago. Perhaps<br />
nothing got us closer to this sentiment than Edward Snowden’s revelations<br />
in June 2013, which exposed the massive scale of the US National<br />
Security Agency’s (NSA) digital surveillance and monitoring activities that<br />
targeted regular citizens and extended beyond the US to friendly European<br />
countries. 257<br />
This historic leak prompted worldwide concern and debate about the right<br />
to digital privacy when using information and communication technologies<br />
(ICTs), including the internet. Data localization also became an issue, since the<br />
NSA leaks led some countries (Russia, Vietnam, Germany, India and others)<br />
to attempt to regulate the flow of data within their borders by requesting that<br />
international internet and technology companies store communication data<br />
pertaining to their citizens in servers inside their countries. 258 Internet freedom<br />
advocates have expressed concern that data localization is detrimental to<br />
a free and open internet, because it will make it easier for countries to spy<br />
on their citizens, may slow technological innovation, and may fragment the<br />
internet by limiting global communications and e-commerce. 259<br />
If any good has come from Snowden’s leaks so far, it is perhaps the global<br />
pushback by civil society and some nation States and a wider recognition<br />
that the right to privacy online is a human right. In December 2013, the<br />
United Nations General Assembly passed a resolution on “the right to<br />
privacy in the digital age,” which urges member States to review and reverse<br />
any policies that violate the right to digital privacy. 260 The resolution stresses<br />
that rights offline must be protected online and reminds member states that<br />
257 Wired. The Most Wanted Man in the World. August 2014.<br />
258 Forbes. Katharine Kendrick. Risky Business: Data Localization. February 19,<br />
2015.<br />
259 Lawfare Research Paper Series. Benjamin Wittes. Jonah Force Hill: The Growth<br />
of Data Localization Post Snowden. July 21, 2014.<br />
260 United Nations General Assembly. Resolution 68/167: The right to privacy in the<br />
digital age.<br />
DIGITAL SECURITY<br />
5
122<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
the right to privacy is included under existing international human rights<br />
law, specifically the International Covenant on Civil and Political Rights,<br />
ratified by 167 countries so far. 261 In March 2015 the UN Human Rights<br />
Council appointed its first ever Special Rapporteur on the Right to Privacy,<br />
whose mandate is to analyze and monitor the right to digital privacy globally,<br />
give guidance to governments and companies, and receive input from all<br />
relevant stakeholders, including civil society. 262<br />
Expansive scope of internet freedom violations<br />
Before Snowden’s NSA leaks, it was usually non-democratic States that<br />
came under the spotlight for violating internet freedoms, including big<br />
violators of internet freedoms such as Cuba, Iran and China. All three<br />
countries are notorious for controlling free access to, as well as freedom of<br />
expression on, the internet through a variety of tactics that are also used by<br />
many other nations.<br />
These tactics include but are not limited to: (1) Blocking and filtering online<br />
content; (2) cyber attacks, of which the most aggressive are Distributed<br />
Denial of Service Attacks (DDoS); (3) blanket blocking of opposition<br />
websites, including social media; (4) shutting down the internet at times<br />
of political unrest, such as protests or elections; (5) take-down requests,<br />
where bloggers are intimidated into taking down content; (6) physical<br />
attacks, including the murder of online journalists, citizen journalists and<br />
digital activists (Syria being the most deadly country for digital activists<br />
and online journalists in 2013); (7) paying commentators to manipulate<br />
discussions online; (8) introducing new laws that limit internet freedoms;<br />
and (9) monitoring and surveillance that prompt users in less democratic<br />
countries to exercise self-censorship. 263<br />
Global decline in net freedoms: increase in<br />
restrictive laws and harsh penalties<br />
According to Freedom House’s annual global survey, Freedom on the Net<br />
2014, there was a global decline in internet freedoms for the fourth year in<br />
a row in the period between May 2013 and May 2014 (the report has been<br />
261 UN Office of the High Commissioner for Human Rights. The Right to Privacy in<br />
the Digital Age.<br />
262 Electronic Frontier Foundation. Kimberly Carlson and Katitza Rodriguez. UN<br />
Human Rights Council Appoints Special Rapporteur on the Right to Privacy.<br />
March 26, 2015.<br />
263 Freedom House. Sanja Kelly. Freedom on the Net 2013: Despite Pushback,<br />
Internet Freedom Deteriorates.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 123<br />
published annually since 2009). 264 “Out of 65 countries assessed, 36 have<br />
experienced a negative trajectory,” with more people being detained and<br />
persecuted for their digital activities in the last year alone than in any other<br />
year.<br />
A notable trend prevalent in both democratic and non-democratic countries<br />
surveyed by the Freedom on the Net 2014 report was the increase in new<br />
laws that limit internet freedoms: 19 countries surveyed passed new laws<br />
“that increased surveillance or restricted user anonymity.” 265 In democratic<br />
countries these laws are often linked to national security concerns. This is<br />
specifically the case in France where, in reaction to the Charlie Hebdo attack<br />
of January 2015, the French National Assembly approved a law in May<br />
2015 that would allow the country’s intelligence services to monitor citizen<br />
communications without judicial oversight. French civil society has launched<br />
a campaign to raise awareness and urge citizen action against the bill. 266<br />
Freedom House also notes that the penalties for online expression are often<br />
much harsher than for similar offline penalties. For example, in Ethiopia<br />
six bloggers belonging to a collective of bloggers known as the Zone 9<br />
Bloggers have been imprisoned since April 2014, under terrorism charges,<br />
for blogging about human rights and social justice issues. Their name<br />
reflects the name of a prison in Addis Ababa that has 8 zones. Expressing<br />
the sentiment that the whole country is becoming a prison, they called<br />
themselves zone9ers, and blogged under the motto “We Blog Because We<br />
Care” to increase the visibility of political prisoners, human rights abuses by<br />
the State and social and cultural issues. 267<br />
The Middle East and North Africa saw the highest number of arrests of<br />
social media users and bloggers in recent times. Especially repressive were<br />
the countries of the Persian Gulf. Perhaps one of the most visible online and<br />
offline campaigns for an imprisoned blogger in the last year was that for the<br />
Saudi blogger, Raif Badawi, who on May 2014 was sentenced by a criminal<br />
court in Jeddah to 10 years in prison, 1,000 lashes and a fine of more<br />
than USD 200,000. According to the court, Badawi had “insulted Islam”<br />
by setting up a liberal online platform that discussed religion and politics. 268<br />
264 Freedom House. Freedom on the Net 2014.<br />
265 Freedom House. Sanja Kelly, Madeline Earp, Laura Reed, Adrian Shahbaz,<br />
and Mai Truong. Freedom on the Net 2014: Tightening the Net: Governments<br />
Expand Online Controls. December 2014.<br />
266 Access. Despite opposition, France approves dangerous new surveillance law.<br />
May 5, 2015.<br />
267 http://trialtrackerblog.org.<br />
268 Global Voices Advocacy. Saudi Blogger Sentenced to 10 years in Prison, 1000<br />
Lashes. May 8, 2014.<br />
DIGITAL SECURITY<br />
5
124<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
CASE STUDY 5: SUDAN<br />
Internet freedoms in Sudan<br />
Sudan is no exception to the global trend. Since early 2011 there have<br />
been annually recurring street protests, mostly led and coordinated<br />
by youth who use social media to organize, mobilize and disseminate<br />
information. In response, the Sudanese government has increased<br />
its digital surveillance capacity, including the expansion of its Cyber<br />
Jihadist Unit. This unit (a department of the National Security and<br />
Intelligence Services) is responsible for the overarching surveillance of<br />
communications, including the tapping of phone calls of opposition<br />
groups, the hacking of social media, email accounts and opposition<br />
websites, and the intimidation of activists online.<br />
In the last decade, Sudan has invested heavily in its telecommunications<br />
infrastructure and by 2013 had a steadily increasing internet penetration<br />
rate of 23 percent (up from 21 percent in 2012 and 19 percent in<br />
2011). The mobile penetration rate was 75 percent by the end of<br />
2013, according to the International Telecommunication Union (ITU). 269<br />
There is healthy market competition amongst four telecommunications<br />
providers and in 2012 Sudan had the cheapest post-paid costs in the<br />
Middle East and North Africa. A growing number of citizens, especially<br />
youth, browse the internet on their phones.<br />
However, all of these infrastructural and economic advantages are<br />
highly compromised by the backdrop of a State that has little respect<br />
for the freedoms of expression, association, participation and peaceful<br />
assembly. The Sudanese regime is amongst the worst globally for<br />
obstruction of access to independent and diverse sources of information<br />
both offline and online.<br />
Since 2013, 270 Freedom House’s Freedom on the Net report has included<br />
a chapter on Sudan. In 2013 and 2014 Sudan was categorized as a<br />
“Not Free” country with a score of 65 (out of 100), as compared to 63<br />
in 2013. Out of 12 African countries surveyed, Sudan was one of three<br />
countries in the “Not Free” category, ranking eleventh – only ahead of<br />
Ethiopia. 271<br />
269 http://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx.<br />
270 Freedom House. Freedom on the Net 2013: Sudan.<br />
271 Freedom House. Freedom on the Net 2014: Sudan.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 125<br />
Foreign Surveillance Weapons: Hacking Team<br />
In early July 2015, the extent of Sudan’s National Security and<br />
Intelligence Services’ (NISS) investment in surveillance or spying<br />
software was exposed when the Italian company, Hacking Team,<br />
which provides surveillance software and hacking tools to government<br />
agencies globally, was itself hacked. 272 A trove of 400 GB of the<br />
company’s files, including invoices and emails, was downloaded and<br />
made public by an anonymous hacker. 273 The documents revealed that<br />
NISS was a client of Hacking Team until the end of 2014, and that it<br />
had paid a total of EUR 980,000 in 2012 for Remote Control System<br />
(RCS) software. This software allows governments to install “implants”<br />
on targeted computers and then steal private information from emails<br />
or skype calls; or even spy on users via their computer webcams.<br />
The leaked documents also showed that Hacking Team was having<br />
difficulties to train NISS on using its hacking software technology<br />
because NISS’s staff did not have English language skills and had<br />
limited computer literacy. Moreover, the United Nations Panel of Experts<br />
on Sudan had started investigating Hacking Team’s links to Sudan in<br />
late December 2014. However, regardless of several attempts to obtain<br />
information, Hacking Team insisted that Sudan was not their client.<br />
Additionally, concerns that Hacking Team is violating the European<br />
Commission’s (EC) sanctions regime against Sudan have prompted a<br />
Dutch member of the European Parliament, Marietje Schaake, to ask<br />
for an EC investigation into Hacking Team’s activities and its links to<br />
oppressive and/or sanctioned regimes like Sudan, Egypt, Ethiopia and<br />
Russia. 274<br />
#SudanRevolts (June-July 2012)<br />
In response to the wave of protests triggered by economic austerity<br />
plans – known as #SudanRevolts – that hit the country between June<br />
and July 2012, the Sudanese authorities implemented for the first<br />
time a large-scale crackdown on, and mass arrests of, citizens and<br />
activists using digital platforms to communicate, connect, coordinate<br />
and mobilize.<br />
DIGITAL SECURITY<br />
5<br />
272 MotherBoard. Here Are All the Sketchy Government Agencies Buyingn Hacking<br />
Team’s Spy Tech. July 6, 2015.<br />
273 https://wikileaks.org/hackingteam/emails<br />
274 Thread Post. EU Lawmaker Wants Answers on Hacking Team Sales to<br />
Sanctioned Countries. July 7, 2015.
126<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
The attacks on cyber dissidents during and after #SudanRevolts<br />
included the detention of digital activists, such as Usamah Mohammed 275<br />
(for posting a YouTube video), for up to two months; the forced exile<br />
of Sudan’s most prominent video blogger, Nagla’a Sid Ahmad; 276 and<br />
the kidnapping and torture of the Darfurian online journalist Somia<br />
Hundosa. 277 Moreover, one of the most high profile political detainees,<br />
Jalila Khamis from the Nuba Mountains, spent nine months in detention<br />
without charge. When she finally faced trial in December 2012, the main<br />
evidence against her was a YouTube video 278 taken by Sid Ahmad,<br />
in which Khamis testified about the shelling of civilians in the Nuba<br />
Mountains by the Government of Sudan. 279 (See chapter 2 for the case<br />
study on the digital campaign for Jalila Khamis.)<br />
Migration of newspapers online and internet<br />
blackouts during the September 2013 protests<br />
Since the separation of South Sudan in 2011, the deteriorating situation<br />
of press freedoms, particularly in the traditional print media, has led<br />
to a highly restrictive environment with an unprecedented number of<br />
confiscations of newspapers after printing – a practice that has severely<br />
impoverished newspapers. There have also been increased incidents<br />
of detentions and summons for interrogation of local journalists and<br />
digital journalists; banning of journalists from writing; and bringing of<br />
court cases against them by state entities. This has all contributed to a<br />
new trend: the establishment of online newspapers. Examples include<br />
the establishment of Al-Taghyeer 280 and Al-Tareeg 281 in 2013 and 2014<br />
respectively.<br />
The Sudanese regime tried to adapt to this trend by extending its<br />
censorship arm online to indulge in technical violence targeting<br />
independent and opposition voices. This included hacking the websites<br />
275 Global Voices. Maha El-Sanosi. Sudan: Protests Trigger Arrests of Twitter<br />
Activists. June 23, 2012.<br />
276 Girifna. A Citizen Journalist and Activist in Forced Exile. October 7, 2012.<br />
277 Girifna. NISS Tortures Journalist Somia Hundosa. November 3, 2012.<br />
278 https://www.youtube.com/watch?v=CmA7pS83EBA.<br />
279 Girifna. Freedom on the Net (2013). October 13, 2013.<br />
280 http://www.altaghyeer.info.<br />
281 http://www.altareeq.info/ar.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 127<br />
of Sudan Tribune 282 and 3ayin 283 in April 2014 and hacking Sudanile,<br />
Hurriyat and 3ayin during the national elections in April 2015. 284<br />
During the protests of September 2013, Sudan experienced a<br />
nationwide 24-hour internet blackout that Renesys, the worldwide<br />
internet intelligence company, stated was “the largest governmentdirected<br />
Internet blackout since Egypt in January 2011.” 285 The<br />
Sudanese government denied that the blackout was intentional on its<br />
part, and blamed a fire in the offices of the telecom provider Canar.<br />
But many believe that the blackout was orchestrated by the National<br />
Telecommunications Corporation (NTC), a government agency, as part<br />
of the Sudanese government’s response to the protests – which were<br />
heavily documented by citizens who circulated videos and images<br />
online that reflected the violent response of the regime. In response<br />
to this government claim, Renesys stated that the internet blackout<br />
“strongly suggests a coordinated action to remove Sudan from the<br />
Internet.” 286<br />
282 Sudan Tribune. Sudan Tribune website hacked; Machar not target of<br />
assassination attempt. April 2, 2014.<br />
283 http://www.3ayin.com.<br />
284 Hurriyat (Arabic blog). Journalists for Human Rights (JHR): Security Agency’s<br />
<strong>New</strong> Hacking Campaign on Sudanese Websites. April 16, 2015.<br />
285 http://research.dyn.com/2013/09/internet-blackout-sudan.<br />
286 Dyn Research: the new home of renesys. Internet Blackout in Sudan. September<br />
25, 2013.<br />
DIGITAL SECURITY<br />
5
128<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Protection against viruses,<br />
spyware and malware<br />
Making sure that your computer is free of viruses and other malware is<br />
a basic step to protecting your data and privacy. Before you worry about<br />
encrypting your communications, browsing and data, you should ensure<br />
the safety of your entire operating system and hardware. The table below<br />
gives an overview of some of the threats linked to viruses and malware,<br />
and proposes preliminary steps to address them in order to get complete<br />
protection.<br />
The antivirus and anti-malware software programs suggested below (Avast<br />
and Spybot) are free and have been vetted by international digital security<br />
experts. There are, however, other paid options that are equally reliable.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 129<br />
Viruses and spyware: What they are and how to<br />
prevent them287288289290<br />
Type of malicious software 287<br />
Virus<br />
(Viruses<br />
include<br />
worms,<br />
macroviruses,<br />
trojans and<br />
backdoors.)<br />
What does it do? Destroys,<br />
damages and infects data, files,<br />
hard drives and external drives.<br />
How does it spread? Internet,<br />
email attachments, malicious<br />
websites, USB keys.<br />
Protection methods<br />
<strong>Use</strong> an antivirus at all<br />
times (free or paid).<br />
Avast 288 is a highly<br />
reputable free antivirus<br />
software for both PCs and<br />
Macs, and it automatically<br />
updates when connected<br />
to the internet. 289<br />
Note: do not install more<br />
than one antivirus at a<br />
time because it will slow<br />
down your computer and<br />
stop the antiviruses from<br />
working efficiently.<br />
Spyware<br />
Trojan<br />
Worm<br />
What does it do? While<br />
spyware does not destroy<br />
information or files, it runs on<br />
your computer without your<br />
knowledge and spies on every<br />
move you make with your<br />
mouse, as well as websites you<br />
visit and information you type.<br />
This information can then be<br />
communicated to someone else.<br />
How does it spread? Internet,<br />
email, malicious websites, USB<br />
keys.<br />
What does it do? Can destroy<br />
information or spy on you.<br />
How does it spread? Some<br />
websites can trick you into<br />
installing malicious software or<br />
can automatically download<br />
malware.<br />
What does it do? Destroys<br />
files and information.<br />
Note: Both trojans and<br />
worms are usually running in<br />
your computer without your<br />
knowledge or consent.<br />
Spybot 290 is a free<br />
program that protects<br />
from spyware and<br />
malware (i.e. trojans and<br />
worms). It works for PCs<br />
only.<br />
Note: Using Spybot<br />
with an antivirus<br />
simultaneously allows<br />
complete protection for<br />
PCs since in PCs an<br />
antivirus alone does<br />
not catch spyware and<br />
malware (trojans and<br />
worms).<br />
DIGITAL SECURITY<br />
5<br />
287 Security in-a-Box. Protect Your Device from Malware and Hackers.<br />
288 https://www.avast.com/en-us/index.<br />
289 https://www.avast.com/en-us/index.<br />
290 https://www.safer-networking.org.
130<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Using phones and mobile devices<br />
securely<br />
This section will introduce the concept of end-to-end encryption and will<br />
discuss adding an additional level of security to passwords through the use<br />
of two-step verification or two-factor authentication. We also discuss basic<br />
tips to use mobile devices securely, as well as useful applications that can<br />
be downloaded on smartphones for improved mobile security, including<br />
secure text messaging, phone calls and video conferencing, sharing of<br />
images/photos, and sending secure and synchronized alarm messages to<br />
your network when you are in danger.<br />
End-to-end encryption<br />
The key to secure communication online is open source “end-to-end<br />
encryption.” The Freedom of the Press Foundation in its publication<br />
Encryption Works defined encryption as:<br />
[T]he process of taking a plaintext message and a randomly<br />
generated key and doing mathematical operations with the two<br />
until all that’s left is a scrambled, ciphertext version of the message.<br />
Decryption is taking the ciphertext and the right key and doing<br />
more mathematical operations until the plaintext is recovered. 291<br />
Thanks to the hard work of citizen cryptographers and the open source<br />
community, it is now possible to have adequate security online (even<br />
when using our phones) due to a decent selection of free open source<br />
applications. 292 However, ensuring your privacy when using encrypted<br />
applications requires that your network of friends and colleagues are also<br />
using the same digital protection measures. This needs discipline and<br />
education of your network about safer alternatives.<br />
Basic steps to mobile phone security<br />
Your phone is a tracking device. Even when it is switched off it is sending<br />
signals to the service towers around you allowing your mobile provider to<br />
geo-locate you easily. 293 The only way to stop this tracking is to switch off<br />
your phone and take the SIM card and battery out (or wrap your phone<br />
in aluminum foil if the battery is not removable). If you are tweeting (or<br />
Facebooking) sensitive information with your phone or smartphone, such as<br />
live-tweeting during a protest, make sure to:<br />
291 Micah Lee. Encryption Works: How to Protect Your Privacy in the Age of NSA<br />
Surveillance. Freedom of the Press Foundation. July 2013.<br />
292 Open source refers to programming code that is made public and that can be<br />
scrutinized in detail for flaws and corrected by other cryptographers.<br />
293 http://vimeo.com/57886217.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 131<br />
• Disable the geo-locator on your smartphone.<br />
• Create a new anonymous social media account.<br />
• Assume that your phone can be lost, stolen or confiscated by<br />
the authorities. Make sure that (1) your phone has a complex pin code,<br />
and (2) you log out of your social media accounts (and other sensitive<br />
applications) after each use.<br />
Tightening the grip on passwords through<br />
two‐step verification<br />
If you are wondering if your password is strong enough, Passfault is an<br />
online platform that evaluates the strength of your passwords by calculating<br />
the time it takes to crack each password. 294 All you have to do is plug in<br />
your password and you will get an analysis of the extent of its strength<br />
or weakness. Passfault does not save passwords tested by users of its<br />
website.<br />
Other than using long and complex passwords that are at least 20 characters<br />
long and considering the use of a password database, such as KeePass 295<br />
or LastPass 296 , using two-step verification (or two-factor authentication)<br />
can offer great added protection. This is particularly true if the password to<br />
your email or social media accounts is compromised. Two-step verification<br />
ensures that it is actually you – the owner of the account – who is accessing<br />
the account. A code is either sent to your mobile phone or generated by<br />
a smartphone application like Google Authenticator. 297 You then have to<br />
enter the code in order to access your account. This feature is becoming<br />
increasingly popular and is available with Google, 298 Facebook (Facebook<br />
calls it login approvals), 299 Twitter, 300 Microsoft 301 and others.<br />
294 https://passfault.appspot.com.<br />
295 http://keepass.info.<br />
296 https://lastpass.com.<br />
297 Google. Install Google Authenticator.<br />
298 Google. Google 2-Step Verification. At: https://www.google.com/landing/2step.<br />
299 Facebook. Andrew Song. Introducing Login Approvals. May 12, 2011.<br />
300 Twitter. Getting started with login verification. May 22, 2013.<br />
301 Microsoft. About two-step verification.<br />
DIGITAL SECURITY<br />
5
132<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Video and additional reading<br />
on mobile security and passwords<br />
● Video from Tactical Technology Collective: Your mobile phone, our<br />
tracking device. 302<br />
● Security in-a-Box has a chapter dedicated to mobile security with<br />
valuable tips on how to: Stay secure when using mobile phones 303<br />
and smartphones; 304 minimize the chances of being spied on<br />
when using your phone; and maximize the chances of staying<br />
anonymous. 305 (Available in Arabic. 306 )<br />
● Security in-a-Box: Create and maintain secure passwords. 307<br />
(Available in Arabic. 308 )<br />
● The Electronic Frontier Foundation: How to Enable Two-Factor<br />
Authentication on Twitter (And Everywhere Else). 309<br />
Encrypted applications for mobile phones<br />
The Electronic Frontier Foundation (EFF), 310 a leading organization in the<br />
fight for digital rights including digital privacy, has scrutinized more than 40<br />
messaging tools and applications and created a scorecard to tell users how<br />
secure these messaging applications are. Some of the most commonly<br />
used messaging tools and applications, such as Facebook chat, Google<br />
hangout, WhatsApp, Viber, and Skype, ranked poorly when it came to<br />
privacy and security. 311 Below are six phone messaging apps that got a full<br />
score or an almost full score according to the EFF’s evaluation of their safety<br />
and security.<br />
302 http://vimeo.com/57886217.<br />
303 Security in-a-Box. <strong>Use</strong> mobile phones as securely as possible.<br />
304 Security in-a-Box. <strong>Use</strong> smartphones as securely as possible.<br />
305 https://securityinabox.org/chapter-10.<br />
306 For mobile phones: https://securityinabox.org/ar/chapter_10. For smart phones:<br />
https://info.securityinabox.org/ar/chapter_11.<br />
307 Security in-a-Box. Create and maintain secure passwords.<br />
308 Security in-a-Box. Create and maintain secure passwords. (In Arabic.)<br />
309 Electronic Frontier Foundation. Parker Higgins. How to Enable Two-Factor<br />
Authentication on Twitter (And Everywhere Else). May 28, 2013.<br />
310 https://www.eff.org/about.<br />
311 Electronic Frontier Foundation. Secure Messaging Scorecard: Which apps and<br />
tools actually keep your messages safe? November 3, 2014.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 133<br />
Encrypted text messaging<br />
Cryptocat 312 is a free open source chat, file and photo-sharing application<br />
that can be used on your computer’s browser and iPhones (there is no<br />
Android application yet but one is planned for release). Additionally,<br />
Cryptocat can be used with Facebook to ensure secure chatting via<br />
Facebook messenger.<br />
Not only does Cryptocat use end-to-end encryption, it also ensures that<br />
messages are encrypted from the user’s side so that everything that enters<br />
Cryptocat’s servers is already encrypted. Hence, even the developers of<br />
Cryptocat cannot read your messages.<br />
You can download a plugin for Cryptocat on a number of browsers, including<br />
Safari, Chrome and Firefox. Another allure of Cryptocat is that you can chat<br />
anonymously. It is very easy to use and does not require that you open an<br />
account. To start a chat you have to login through your browser or phone<br />
application; choose a “conversation name” and “nickname;” and then share<br />
the conversation name with people you would like to talk to, via encrypted<br />
email or any other safe method. Each time you use Cryptocat, you can<br />
choose a different “conversation name” and “nickname.” There is no saved<br />
record of your chat. The moment you close the conversation it is all gone.<br />
surespot 313 is a free open source encrypted messaging application that<br />
works on both iPhones and Android. It permits texting, voice messaging<br />
and the exchange of images. surespot allows you to have multiple identities<br />
on one device. For added security, each time you open the application you<br />
will have to input your password.<br />
DIGITAL SECURITY<br />
5<br />
312 https://crypto.cat.<br />
313 https://www.surespot.me.
134<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Video and additional reading<br />
on secure mobile messaging apps<br />
International Elevate Award 2014: Cryptocat. 314 A video that explains<br />
what Cryptocat is and how it works.<br />
What’s up with Crypto in WhatsApp? 315 This article explains why the<br />
popular phone messenger WhatsApp is still not fully secure regardless<br />
of the announcement in November 2014 that the app is now encrypted<br />
end-to-end.<br />
Your iPhone Can Finally Make Free, Encrypted Calls. An article about<br />
Signal, the first encrypted calling app for the iPhone. 316<br />
Encrypted phone calls and voice chatting<br />
RedPhone 317 is a free open source application that allows end-to-end<br />
encrypted phone calls for Android phones. RedPhone uses your phone<br />
number to make calls so you do not need to create another identifier. It allows<br />
you to use the main dialer on your phone and call using a WiFi connection<br />
or your phone data plan. The calls are encrypted as long as you are calling<br />
someone who is also using RedPhone or its equivalent for the iPhone, Signal.<br />
Signal 318 is the first free open source and encrypted voice call app for the<br />
iPhone (released in mid-2014). It is compatible with RedPhone (both Signal<br />
and RedPhone are made by the same company, Open Whisper Systems 319 ).<br />
Silent Phone 320 is made by the company Silent Circle, 321 which makes<br />
high-end encrypted applications for corporate clients. Silent Phone is<br />
therefore not a free application. It works with both Android and iPhones, and<br />
each subscriber gets a 10-digit number. When calling those not using Silent<br />
Phone, only one side of the conversation is encrypted.<br />
314 https://vimeo.com/elevatefestival/cryptocat.<br />
315 Me & My Shadow. What’s up with crypto in WhatsApp? December 14, 2014.<br />
316 Wired. Andy Greenberg. Your iPhone Can Finally Make Free, Encrypted Calls.<br />
July 29, 2014.<br />
317 https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone.<br />
318 https://itunes.apple.com/app/id874139669.<br />
319 https://whispersystems.org/#privacy.<br />
320 https://play.google.com/store/apps/details?id=com.silentcircle.silentphone&hl=en.<br />
321 https://silentcircle.com/#apps.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 135<br />
Jitsi 322 is a free, encrypted off-the-record (OTR) chat and video conferencing<br />
tool that completely replaces voice and instant messaging programs such as<br />
Google Hangouts and Skype. It supports many popular instant messaging<br />
and telephony protocols including SIP, Jabber/XMPP (and hence Facebook<br />
and Google Talk), AIM, ICQ, MSN and Yahoo! Messenger.<br />
Jitsi’s video conferencing option on your phone or computer’s browser can<br />
be accessed at https://meet.jit.si. You do not even need to open an account<br />
to use Jitsi. Jitsi creates a unique URL once you login that you may share<br />
with any number of people you want to include in the call. Remember to use<br />
encrypted email/messaging when you share the unique URL with others you<br />
are inviting. You can also protect the conversation by setting a password<br />
(use the lock icon on the top). Jitsi allows complete sharing of documents<br />
and attachments. It also works well in settings where the internet is slow.<br />
Jitsi can be downloaded as a software for PCs and Macs.<br />
Alerting family and friends in case of danger: The phone<br />
app Panic Button<br />
In mid-2014 Amnesty International 323 released Panic Button, 324 which is<br />
an app targeted at human rights defenders and activists at risk of sudden<br />
arrest, kidnapping or torture. Panic Button is an Android application that<br />
sends an SMS alert message and your location to a network of up to three<br />
contacts to let them know that you are in danger. To work well, however,<br />
the alert message that Panic Button sends needs to be set up in advance<br />
and your “emergency contacts” need to be notified ahead of time so they<br />
can act swiftly. To trigger an alarm message, users of Panic Button have to<br />
rapidly press the phone’s power button five times in five seconds until they<br />
feel a vibration.<br />
DIGITAL SECURITY<br />
5<br />
322 https://jitsi.org.<br />
323 Wired.co.uk. Olivia Solon. App turns power button into power button for activists<br />
at risk. June 23, 2014.<br />
324 https://panicbutton.io/#home.
136<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Additional resources for mobile security:<br />
The Guardian Project<br />
The Guardian Project 325 provides a host of free open source<br />
applications for mobile devices including applications for encrypted<br />
phone calls (Ostel), 326 using a secure browser (Orbot) 327 on your phone,<br />
and chatting or messaging securely (ChatSecure). 328<br />
Mobile Security Guide 329 from the Guardian Project is a step-by-step<br />
guide prompted by questions: Your responses point you to the phone<br />
application most suited for a specific need.<br />
325 https://guardianproject.info/apps.<br />
326 https://guardianproject.info/apps/ostel.<br />
327 https://guardianproject.info/apps/orbot.<br />
328 https://guardianproject.info/apps/chatsecure.<br />
329 https://guardianproject.info/howto.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 137<br />
Resources for digital activists<br />
at risk<br />
With the global increase in surveillance and online censorship by<br />
governments, and the decline in freedom of expression online that involves<br />
unprecedented threats to online journalists as well as bloggers, digital<br />
activists and normal users of social media outlets, the need to provide both<br />
technical and physical assistance to digital activists at risk is rising. Below<br />
are a few organizations that provide a range of services (both technical and<br />
financial) to human rights defenders, journalists and digital activists.<br />
Access Now Digital Security Helpline. 330 This international NGO<br />
(headquartered in <strong>New</strong> York) has a responsive 24-hour security helpline,<br />
based out of Manila, San Jose and Tunis. It supports human rights<br />
defenders by giving technical support and personalized recommendations<br />
and guidance on improving secure communications and digital security and<br />
bolstering the security of the infrastructure of websites and social media<br />
against attacks. The helpline also does face-to-face consultations and<br />
referrals for capacity-building and trainings.<br />
Committee to Protect Journalists (CPJ) 331 provides direct assistance<br />
to journalists at risk and their families for both digital and non-digital<br />
emergencies. Support includes: Legal funds for journalists in prison;<br />
relocation to safe havens; support for political asylum cases; and medical<br />
assistance. CPJ also has a useful Journalist Security Guide 332 that targets<br />
journalists operating in dangerous environments and gives them advice on<br />
risk assessment and digital security.<br />
Frontline Defenders. 333 This Irish NGO has had a security grants program<br />
since 2001 that targets human rights defenders at risk from a range of<br />
dangers, including: Assistance with digital and communications security;<br />
physical security; legal and medical support; and financial support to<br />
families of imprisoned human rights defenders. It funds both emergencies<br />
and general security requests for up to 7,500 Euros.<br />
Deflect. 334 This project provides free and specific technical assistance to<br />
independent media, human rights organizations and activists suffering from<br />
distributed denial of service (DDoS) hacking attacks that threaten to bring<br />
down their websites and censor their voice online. The Deflect project’s<br />
technology allows organizations and individuals who qualify for assistance<br />
to have websites that are resilient to DDoS attempts. The eligibility<br />
DIGITAL SECURITY<br />
5<br />
330 https://www.accessnow.org/pages/tech#Digital%20Security%20Helpline.<br />
331 https://cpj.org/campaigns/assistance/what-we-do.php.<br />
332 https://cpj.org/reports/2012/04/journalist-security-guide.php.<br />
333 Frontline Defenders. Security Grants Programme.<br />
334 https://deflect.ca.
138<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
requirements include organizations that have suffered from DDoS attacks in<br />
the past and fear future attacks. 335<br />
Digital Defenders Partnership (DDP). 336 Hivos (an international NGO<br />
based in the Netherlands and supported by the Dutch government) has a<br />
program for human rights defenders focused on digital activists. Support<br />
includes tools to circumvent censorship and provide assistance, in the form<br />
of small grants, to people facing digital emergencies; and legal protection<br />
to bloggers and activists who are on trial due to their online expression. 337<br />
Emergency financial assistance is also made available to civil society and<br />
media organizations under digital attack to help them mitigate threats and<br />
create threat models and response strategies. 338<br />
Digital First Aid Kit 339 is a useful self-diagnostic tool designed to help<br />
human rights defenders, bloggers and activists who are facing digital threats<br />
to better understand the risks to which they are exposed. The kit begins by<br />
enabling users to establish a secure communication and then goes through<br />
a series of questions about the user, and his or her devices and specific<br />
situation. This helps users to understand the challenges they face and<br />
when to request help from a specialist. The kit includes sections on account<br />
hacking, seizure of devices, malware infections, and DDoS attacks.<br />
Seed Alliance 340 is a small grants 341 program with geographic coverage that<br />
spans Africa, Asia and Latin America and a focus on: Improving the quality of<br />
digital openness; inclusion of minorities in nascent networked communities;<br />
bolstering digital access and freedom of expression online (including<br />
freedom of association, privacy, security and consumer rights); supporting<br />
innovative solutions; and deepening information networks. It also develops<br />
content, applications and solutions for timely and large-scale dissemination<br />
of information. The Seed Alliance is a collaboration established between the<br />
FIRE, 342 FRIDA 343 and ISIF Asia 344 grants programs. 345 The Africa region is<br />
supported by the African Network Information Center (AFRINIC).<br />
335 https://wiki.deflect.ca/wiki/Get_Protected.<br />
336 www.digitaldefenders.org.<br />
337 https://digitaldefenders.org/#subsection-emergency-grants.<br />
338 Ideas can be sent to ddp@hivos.nl for review of proposal ideas. Twitter handle:<br />
@DigiDefenders.<br />
339 http://digitaldefenders.org/digitalfirstaid.<br />
340 http://www.fireafrica.org/seed_alliance.<br />
341 http://www.fireafrica.org/grant.<br />
342 http://www.fireafrica.org.<br />
343 http://programafrida.net.<br />
344 http://isif.asia.<br />
345 For more information about grant categories see http://www.fireafrica.org/grant.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 139<br />
Foundations for safe online<br />
browsing and communication<br />
There is not one magical tool that will completely protect the privacy of<br />
your communications when you are surfing the internet. In this section we<br />
discuss a number of tools and software that, when used together, can<br />
give you an adequate level of protection. They include: HTTPS encrypted<br />
browsing; end-to-end encrypted emails; anonymous browsing through<br />
using Tor Project and/or a Virtual Private Network (VPN); and off-the-record<br />
(OTR) chat/instant messaging.<br />
HTTPS encrypted browsing: Means your<br />
connection to the internet is secure<br />
Make sure to check for HTTPS or for a lock icon in the address bar of your<br />
browser. The additional “s” indicates that your connection (or information in<br />
transit) to the internet is secure and encrypted, hence protecting you from<br />
being intercepted. (This technology is called Secure Sockets Layer or SSL<br />
encryption.) HTTPS secure connection is particularly important if you are<br />
about to give personal information, such as banking or financial details or your<br />
email password. The Electronic Frontier Foundation and Tor Project created<br />
an HTTPS Everywhere extension for Firefox, Chrome, Firefox for Android<br />
phones and Opera browsers. HTTPS Everywhere extension automatically<br />
switches thousands of sites from the insecure HTTP to HTTPS. 346<br />
Nowadays most email providers (including Gmail, Hotmail and most<br />
recently Yahoo!) have an HTTPS encrypted connection. However, Gmail<br />
is more secure than other email companies, because Google submits<br />
a “transparency report” every six months. (Hotmail and Yahoo! have<br />
also started issuing transparency reports, but they are not as frequent<br />
and extensive as Google’s). 347 Google was a pioneer in issuing the first<br />
transparency report back in 2010, which urged companies like Facebook,<br />
Twitter and others to follow suit.<br />
DIGITAL SECURITY<br />
5<br />
346 Electronic Frontier Foundation. HTTPS Everywhere.<br />
347 Google. Transparency Report. At: http://www.google.com/transparencyreport.
140<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
End-to-end encrypted emails just got easier!<br />
Pretty Good Privacy (PGP) is the most secure protocol for end-to-end<br />
encrypted email. However, it is complex to use because it requires the<br />
creation of a public key that you share with others (to ensure that it is actually<br />
you), and a private key that you use to decrypt or open messages. It is also<br />
obligatory for both parties to communicate using the same method. This<br />
means that only those who are technically advanced use it. 348<br />
End-to-end encryption in email is nonetheless still highly recommended<br />
and a new generation of simpler tools is emerging. This includes Tutanota<br />
encrypted email, 349 a new open-source (German-based) encrypted email<br />
platform. Tutanota does not store passwords of its users (if you lose your<br />
password you have to create a new account). If you are communicating with<br />
someone not using Tutanota you can still encrypt emails with a password.<br />
Everything in your message is automatically encrypted, including the subject<br />
line, content and attachments (unencrypted messages are stored encrypted<br />
in Tutanota’s servers). This new end-to-end encrypted email platform is<br />
therefore much easier to use than traditional PGP encrypted email.<br />
348 Micah Lee. Encryption Works: How to Protect Your Privacy in the Age of NSA<br />
Surveillance. Freedom of the Press Foundation. July 2013.<br />
349 https://tutanota.com.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 141<br />
Essential Digital Security Resources<br />
The Surveillance Self-Defense 350 project by the Electronic Frontier<br />
Foundation (available in Arabic 351 ). This resource has extensive howto<br />
toolkits that include tips and information on safer communication<br />
tailored for use by Mac users, journalism students, activists, protestors,<br />
online journalists, digital security experts, and LGBTQ youth. It also<br />
includes a “security starter pack” for beginners.<br />
Security in-a-Box, 352 by Tactical Tech and Frontline Defenders, has<br />
practical how-to’s for configuring secure communications software,<br />
and advice on how to use social media platforms and mobile phones<br />
more securely. (Available in Arabic. 353 )<br />
Speak Safe: <strong>Media</strong> Workers Toolkit for Safer Online and Mobile<br />
Practices. 354 A concise toolkit produced by Internews that targets<br />
media professionals. (Available in Arabic. 355 )<br />
Me & My Shadow 356 is a website created by the Tactical Technology<br />
Collective that helps you trace the shadows you leave online and gives<br />
you tools to manage them. (Available in Arabic. 357 )<br />
350 https://ssd.eff.org/en.<br />
351 https://ssd.eff.org/ar.<br />
352 https://securityinabox.org/en.<br />
353 https://info.securityinabox.org/ar.<br />
354 http://www.internews.org/sites/default/files/resources/Internews_SpeakSafeToolkit.<br />
pdf.<br />
355 http://www.internews.org/sites/default/files/resources/Internews_SpeaksafeToolkit_<br />
Arabic_2013-06.pdf.<br />
356 https://myshadow.org.<br />
357 https://myshadow.org/ar.<br />
DIGITAL SECURITY<br />
5
142<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Anonymous browsing: Tor and VPN<br />
What is Tor and what is it useful for?<br />
Tor is a free open source software that allows you to stay anonymous when<br />
you are online. 358 Tor does the following:<br />
• Protects your privacy by hiding your IP address (a very good indicator of<br />
your location).<br />
• Allows you to circumvent government censorship of blocked websites.<br />
• Encrypts all traffic within the Tor network.<br />
• Stops websites from tracking your online browsing habits.<br />
Tor is powered by a global network of more than 4,000 volunteer servers<br />
called nodes. When someone uses Tor to visit a website, instead of going<br />
to the website directly they are redirected to a connection that goes through<br />
three nodes (or circuits) before it finally exits into the public internet. It is<br />
like taking a long and convoluted way to your house because you suspect<br />
someone is following you, and you want to lose them. This distributed<br />
network makes those who are monitoring your traffic think that your location<br />
(IP address) is that of the last node your traffic exited from. Each time you<br />
use Tor you will have a different IP address because the path of your nodes<br />
will differ.<br />
How does Tor work?<br />
To use Tor you need to download the Tor browser bundle. 359 However, if<br />
you use Tor you still need to be diligent with security as Tor will only<br />
encrypt your information when you are inside the Tor network. Once<br />
you reach your final destination on the internet you will need to ensure that<br />
your connection is secure by using an HTTPS encrypted connection.<br />
A disadvantage often noted about Tor is that it slows down your internet<br />
connection because your traffic is being routed through multiple relays or<br />
358 https://www.torproject.org/index.html.en.<br />
359 https://www.torproject.org/projects/torbrowser.html.en.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 143<br />
nodes. Tor is therefore not recommended for streaming video. Additionally, if<br />
someone is monitoring your traffic, they can see that you are using Tor and,<br />
in some countries like China, Internet Service Providers (ISPs) have blocked<br />
access to Tor entry nodes or relays. 360<br />
Some videos to watch<br />
Tor Animation. 361 This animation was created by the Tor Project. It<br />
explains what Tor is and how it works. (Available in Arabic. 362 )<br />
How Tor Works. 363 An MIT video that illustrates how Tor uses a series of<br />
nodes or relays to protect anonymity.<br />
Psiphon-Beyond Borders. 364 A video that introduces Psiphon’s VPN<br />
service.<br />
360 MIT Technology Review. How China Blocks the Tor Anonymity Network. April 4,<br />
2012.<br />
361 YouTube. Tor Project. Tor Animation. May 17, 2015.<br />
362 https://youtu.be/6v0ga4f2myY.<br />
363 MIT Video. Conrad Warre. How Tor Works.<br />
364 YouTube. Psiphon. Psiphon – Beyond Borders. March 23, 2015.<br />
DIGITAL SECURITY<br />
5
144<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Virtual Private Network (VPN)<br />
If you are looking for anonymous browsing that has all the benefits of<br />
Tor software in addition to a fast internet connection, a VPN might be a<br />
good choice. Like Tor, VPN offers anonymous browsing, hides the user’s<br />
IP address, bypasses censorship or blocked websites and encrypts traffic<br />
within the VPN’s network.<br />
VPN is faster because users are passing from their computers directly to the<br />
servers of the VPN service provider or company. However, it is important to<br />
note that the VPN provider has access to your traffic and information, and<br />
therefore must be trusted. 365 Moreover, a VPN connection will not protect<br />
you once you are on the public internet. As is the case with Tor, you will still<br />
need to connect securely via an encrypted HTTPS channel.<br />
Examples of trusted VPN services include:<br />
Securitykiss. 366 Created by a Polish company, Securitykiss works on both<br />
PCs and Macs and costs USD 50 per year.<br />
Psiphon 367 is a free open source VPN that works only on PCs and Android<br />
phones. It was created by Canadian activists.<br />
365 Surveillance Self-Defense. A Project of the Electronic Frontier Foundation.<br />
Choosing the VPN That’s Right for You.<br />
366 http://www.securitykiss.com.<br />
367 https://psiphon.ca/en/index.html.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 145<br />
Off-the-Record (OTR) chatting<br />
Who does not rely on at least one popular instant messaging (IM) or chatting<br />
tool, such as Facebook’s messenger, MSN, or Google’s Chat? Even if<br />
you connect to these services via an encrypted HTTPS connection, the<br />
fact is that these companies have your information and can hand it to the<br />
authorities if they are subjected to sufficient pressure.<br />
Off-the-Record (OTR) is an encryption layer or plugin that can be added to<br />
any IM or chat tool that supports OTR. 368 OTR tools do not host IM services<br />
themselves. They are third party clients that connect to the services run by<br />
others. Hence, OTR allows end-to-end encrypted conversations through<br />
many popular chatting services like MSN or Facebook messenger. Another<br />
thing that OTR chat does is verify the identity of those with whom you are<br />
talking. OTR services generate a new encryption key for every conversation.<br />
This feature is called “perfect forward secrecy” (PFS) and it holds true for<br />
zRTP-encrypted VoIP tools, as well as the chatting and video conferencing<br />
tool Jitsi, which was mentioned earlier in this chapter.<br />
Examples of free and open source OTR clients are Pidgin 369 and Adium. 370<br />
Pidgin is a chat program for PCs (Windows, Linux and UNIX operating<br />
systems) that permits you to log into multiple chat services at the same time<br />
(i.e. Google Talk, MSN, Yahoo!) using one interface. Pidgin is compatible with<br />
many chat networks and is available in a lot of languages, including Arabic.<br />
Adium, on the other hand, works with Macs (OS X operating systems) and<br />
supports a wide range of IM services.<br />
Otr.to is an easy to use browser-based OTR encrypted chat that works<br />
with Chrome or Firefox and does not require you to open an account or<br />
download any software. When you start a chat you are given a unique URL<br />
and ID. The chat starts when someone else opens the link or enters your ID.<br />
DIGITAL SECURITY<br />
5<br />
368 https://otr.cypherpunks.ca.<br />
369 http://pidgin.im/about.<br />
370 https://www.adium.im/about.
146<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Interviews<br />
The basics of digital security<br />
In this interview we talk about your digital security with Eric<br />
Johnson, who works on aid projects aimed at improving access<br />
to information in developing countries – especially relating to cyber<br />
liberty and online safety for journalists and civil rights activists.<br />
Q1. You’ve worked with groups such as journalists and civil<br />
society activists and these groups often sit on sensitive<br />
information, and therefore a situation of loss of important<br />
information or data is highly possible. What are the most<br />
basic measures of protection that you advise for those who<br />
have never taken any steps to ensure their digital security?<br />
1. Update your software. Make sure you’re running only the<br />
very newest versions of all your software (your OS, your<br />
productivity software, your browsers, Skype, Acrobat Reader,<br />
Java VM) – fully patched, fully updated – and make sure your<br />
software stays patched/updated, always, all the time. This might<br />
require that your software (especially Microsoft Windows and<br />
Microsoft Office) be licensed. I realize this is a cost, but it’s a<br />
necessary one, and it’s not a lot. (For example, right now I buy<br />
MS Windows update licenses for about USD 90 per year, and<br />
Office costs USD 2 per month.)<br />
2. Wholly encrypt your hard drive. If you’re running the newest<br />
version of your operating system (Windows or Mac OS X), then<br />
you have whole-hard-drive encryption available to you (built in),<br />
but it’s not on. Turn it on!
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 147<br />
3. <strong>Use</strong> https not http. Ensure all your online communication (IM,<br />
VoIP, email, social networking) is encrypted while traversing<br />
your country’s cyberspace. For IM & VoIP, use Skype. For email,<br />
use any of Gmail, Hotmail, or Yahoo. For SMS, use Facebook.<br />
The main thing is, if you’re using a browser, make sure the URL<br />
in the address bar always (while you’re communicating) starts<br />
with HTTPS (not just HTTP) – it’s that “S” which is providing the<br />
encryption.<br />
4. Keep a good antivirus. “Good” means reputable and everyday-self-updating,<br />
as well as running at all times on all the<br />
computers you use.<br />
5. Turn on multi-factor authentication everywhere possible,<br />
especially email, Facebook (Google calls it “two-step verification”).<br />
6. Do not use mobile phones for anything for which you want<br />
security.<br />
7. Back up regularly – perhaps in the cloud – so that if your<br />
device is lost/stolen, you still have your data.<br />
8. Never enter your password into a computer you do not control<br />
(e.g. a cybercafé computer).<br />
9. <strong>Use</strong> strong passwords:<br />
● Minimum 12 characters.<br />
● None of the passwords known by hackers to be used by<br />
everyone (e.g. “123456” or “password”).<br />
● Nothing an attacker could guess (your birth date, your<br />
spouse’s name, your dog, your hometown) – ideally, no<br />
“words.”<br />
● A mix of uppercase and lowercase letters, numbers, and<br />
punctuation.<br />
● Unique password (i.e. do not reuse passwords across sites).<br />
You can use a password manager like LastPass 371 to generate<br />
secure passwords, that stores and remembers your passwords.<br />
Q2. What are the more advanced steps that can be taken<br />
by groups most at risk from situations like confiscation of<br />
equipment, hacking or surveillance?<br />
If you take all the above steps, you’re in good shape. If you want to<br />
be more secure you can also:<br />
1. <strong>Use</strong> OpenPGP to encrypt your email “end-to-end” – but<br />
this requires that both ends use it (e.g. Enigmail, SED, AGP,<br />
Mailvelope).<br />
DIGITAL SECURITY<br />
5<br />
371 https://lastpass.com.
148<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
2. <strong>Use</strong> Off-the-Record (OTR) to browse anonymously and<br />
encrypt your IM (instant messages) more securely even than<br />
Skype – which is already encrypted. (For example, use IM<br />
programs like Pidgin, Jitsi, ChatSecure.)<br />
3. <strong>Use</strong> ZRTP (for example, Ostel) to encrypt your VoIP more<br />
securely even than Skype.<br />
4. <strong>Use</strong> a proxy (such as Tor or a VPN) for all your online activity to<br />
prevent your ISP from knowing what you’re doing online.<br />
But really, these are overkill. Every compromise I’ve heard of (and<br />
that’s a lot!) was a result of not following the advice I give above<br />
under Q1. So, do not pay attention to the answers to Q2 unless/<br />
until you’ve taken care of all the advice given under Q1. Prioritize!<br />
Q3. For activists and journalists who use social media heavily,<br />
either to raise awareness about an issue, share their work or<br />
to organize and mobilize, what steps can be taken to protect<br />
(1) their privacy and the privacy of those with whom they<br />
communicate, and (2) their physical security (especially since<br />
all new mobile devices have GPS technology that gives away<br />
your location).<br />
1. Beyond following the above steps for yourself, get your friends to<br />
follow these steps too.<br />
2. Turn off your phone.<br />
Physical security is far harder.<br />
Q4. In Sudan civil society, institutions and individuals suffer<br />
mainly from three types of cyber attacks: (1) the hacking of<br />
institutional websites (often news sites); (2) the hacking of<br />
Facebook accounts; and (3) the hacking of email accounts.<br />
(The last two sometimes result in permanent loss of access<br />
to the accounts.) What kind of measures can protect from<br />
such attacks?<br />
1. Keep your website’s hosting software thoroughly up-todate.<br />
You cannot count on your hosting company to do this –<br />
you have to regularly check it yourself.<br />
2. Make sure everyone who has login credentials follows the<br />
answers to your Q1; and<br />
3. Isolate a site’s login from the site itself (in other words, use a<br />
different domain/IP address).<br />
See the answers to Q1.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 149<br />
Mesh networking as a solution for poor<br />
connectivity or network interruptions<br />
Reliable internet access is not something we can always take for<br />
granted. Network interruptions are common during environmental<br />
crises, such as major storms and earthquakes. We have also seen<br />
governments shut down the internet during political unrest in places<br />
like, Egypt, Syria and Sudan.<br />
Is there a solution that can be available to wider audiences and<br />
close communities during an internet blackout? Apparently yes,<br />
and it is called “mesh networking.” To learn about this we talked to<br />
Nat Meysenburg, a Technologist at Open Technology Institute 372<br />
in Washington D.C. Nat is working with the Commotion Project, 373<br />
whose main mission is to provide open source communication tools<br />
for mobile phones, computers, and other wireless devices to create<br />
decentralized mesh networks.<br />
Q1. Can you explain for us the concept of mesh networks and<br />
give examples of settings in which its implementation has<br />
been useful?<br />
A mesh network is a network where each device in the network<br />
can talk to all the devices it can see, and pass information through<br />
all the devices it can detect. As a result you can pass information<br />
along a chain of devices. This is different from wireless setups that<br />
are deployed in most of the world, where your device is talking to<br />
one other device, and that one other device has been wired into the<br />
internet. In the case of mesh networks the devices don’t even<br />
have to be on the internet to communicate with each other.<br />
They are speaking from one device to another over a networked<br />
chain, which allows for rapidly changing networks based on needs.<br />
This is a very useful technology based on a number of scenarios.<br />
One is just giving basic access to information to communities where<br />
that access isn’t there. One example is in the town of Saeeda in<br />
Tunisia. There is a mesh network there that, while not connected<br />
to the internet, has the photocopy of the Arabic Wikipedia and<br />
thousands of public domain French ebooks and other resources.<br />
So, without being connected to the internet, this small town is able<br />
to get some of the rich information and content-sharing that the<br />
internet has to offer.<br />
In other places where the infrastructure hasn’t been built there is the<br />
Abaarso School of Technology in Somaliland, 374 which has a mesh<br />
network so that the students there can learn how to do internet-web<br />
projects and share with each other inside the school without having<br />
DIGITAL SECURITY<br />
5<br />
372 https://www.newamerica.org/oti.<br />
373 https://commotionwireless.net.<br />
374 http://www.abaarsoschool.org.
150<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
to depend on their weak and sometimes non-existent uploading to<br />
the internet (which is an optical link that runs across the desert). In<br />
that instance we are talking about a place in the world where no one<br />
is going to build a network infrastructure, so the school is able to do<br />
it themselves.<br />
The last example is another place where no one will build a network<br />
infrastructure, which is a bit surprising because it is in <strong>New</strong> York<br />
City. It is in Red Hook, Brooklyn, a neighborhood that has one of<br />
the largest concentrations of public housing. A mesh network was<br />
set up by a community organization there that provides access and<br />
applications to the people in the neighborhood. Red Hook is a good<br />
example of not only being able to provide constant and consistent<br />
[internet] access to that community, but also during Hurricane<br />
Sandy in 2012, the mesh network was one of the only pieces<br />
of communications infrastructure that was left standing in<br />
that neighborhood. It was used by the disaster responders to<br />
connect people [impacted by the hurricane] to the internet and find<br />
out what was going on and how they can get help.<br />
Q2. Where does the Commotion Project come in? What is its<br />
main goal and what services does it provide?<br />
The Commotion Project aims to be a fully open source wireless<br />
mesh networking platform that will target devices that are already<br />
on the ground in places. The idea is, in order to make this cheap<br />
and easy to do, we need to use what already exists in the (local)<br />
market all over the world, and then write the software to use that<br />
hardware so that all these devices already out there can be joined<br />
into a mesh network. Our goal is to support as much hardware as<br />
we can, and for communities to be installing commotion and setting<br />
up commotion. Our ultimate goal is one that is almost impossible<br />
to measure, which is for people to be installing a commotion mesh<br />
network that we don’t even know about.<br />
Q3. In order to benefit from the software services provided<br />
by the Commotion Project, what kind of technical know-how<br />
and/or hardware is required to get a mesh network up and<br />
running?<br />
There is a learning curve with wireless mesh technologies. This<br />
includes some basic skills of radio and a little knowledge about the<br />
software. Also, there is a huge community component such as,<br />
how to talk to your neighbors about putting devices around their<br />
community, how to attach those devices and where to put them.<br />
To that end the Commotion Project has put out the Commotion<br />
Construction Kit, 375 which is a full set of documentation that covers<br />
375 https://commotionwireless.net/docs/cck.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 151<br />
everything from how to talk to your neighbors, to how to mount a<br />
device, to how the software works.<br />
The goal there is that communities can build their capacity on their<br />
own to grow and maintain the network. The Construction Kit gives<br />
communities all the information they need to do that and it is available<br />
in English, French and Spanish. You can find the Construction Kit on<br />
our website, 376 where you can also get in touch with us if you have<br />
questions or [if you] possibly [want to] help us translate the kit into<br />
your local language.<br />
As far as hardware that is needed, it depends on the needs of<br />
the network and the community. For instance, if you are building<br />
a network that you’re hoping will stay in the community for a long<br />
period of time, it is advisable to get better quality hardware. By better<br />
I mean higher power radios and devices that are designed to do<br />
outdoor WiFi. These devices are less than USD 100 and are widely<br />
available.<br />
However, as I said earlier, our goal is to work with hardware that is<br />
already locally available. We are currently developing a software that<br />
can run on your laptop and turn your laptop into a commotion node<br />
– a device that can receive and pass traffic along the mesh network.<br />
Q4. What have been some of the main challenges that<br />
communities face when attempting to set up mesh networks?<br />
Is there free technical support available from your team at the<br />
Commotion Project?<br />
The challenges in general vary by location. For instance, in US cities<br />
like Brooklyn, there are technical challenges around how much radio<br />
signal is in your city because we are working with very weak radios,<br />
it’s very easy to have that signal crowded out by other signals. There<br />
are a lot of tall brick buildings in the neighborhood that block WiFi<br />
signals. However, there is nothing political that stands in the way of<br />
that mesh network.<br />
On the other hand, you can go to areas where there are no radios at<br />
all, and there you are not going to have technical problems, but you<br />
may have social problems that the community may need to deal with.<br />
In terms of technical support that we provide, we are trying to build<br />
a large community, with lots of people who can take questions.<br />
However, our development team is not big enough to support every<br />
commotion network in the world. We provide support as best as we<br />
can, but we can’t guarantee complete support. We like to answer<br />
questions and our goal is to train communities to support their<br />
mesh networks by themselves. As the project grows we’re trying<br />
to set up more training programs.<br />
DIGITAL SECURITY<br />
5<br />
376 https://commotionwireless.net.
152<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Sudanese civil society and its digital security<br />
challenges<br />
Abdel-Rahman El-Mahdi is a member of Sudanese civil society and<br />
the founder and executive manager of the Sudanese Development<br />
Initiative (SUDIA), 377 a non-profit organization specializing in good<br />
governance, youth empowerment and the advancement of civil<br />
society and the media.<br />
Abdel-Rahman talked to us about the challenges Sudanese civil<br />
society faces when it comes to protecting its privacy and digital<br />
security while using the internet and other modes of information<br />
and communication technologies (ICTs). This is especially relevant<br />
in the context of the current environment in Sudan where we have<br />
seen in the early months of 2015 yet another wave of attacks on<br />
civil society that included the mass confiscation of newspapers, as<br />
well as closures of civil society and cultural organizations such as<br />
the Sudanese Writers Union and the Mahmoud Mohammed Taha<br />
Cultural Center. 378<br />
Q1. What are the most felt challenges you believe the<br />
Sudanese independent civil society is facing when it comes<br />
to lack of diligence with their digital security, whether online<br />
or offline?<br />
Foremost is the lack and/or weakness of robust and well-developed<br />
systems within the institutions. Most civil society organizations<br />
are underdeveloped in terms of their internal governance and<br />
organizational systems and procedures. Digital security is but one of<br />
a myriad of internal measures that need to be developed and put in<br />
place, and if organizational health is the measure it is not necessarily<br />
the priority.<br />
Q2. Despite the heavy price that the lack of digital security<br />
procedures is resulting in for civil society, we are not yet<br />
seeing a visible change in behavior. Why is that, and what do<br />
you think is needed to create this necessary shift?<br />
I would tend to disagree that lack of digital security is exacting<br />
a heavy toll on civil society. The toll that might be exacted when<br />
organizations are closed and have their equipment confiscated is<br />
the loss of data or the organizational electronic records and files,<br />
and as far as I know, none of the organizations that have been<br />
closed down within the NGO sector have complained of that. The<br />
heavier toll, which these organizations suffer from, is the actual loss<br />
377 http://sudia.org/index.php/about-us.<br />
378 Almarsad Alsudani (Arabic blog). With Nearing Elections: More Closures,<br />
Confiscations and Limitations on the Work of Civil Society. February 9, 2015.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 153<br />
of their equipment and assets more so than the loss of their data.<br />
Data is oftentimes backed up and if not can be recovered from other<br />
sources.<br />
So, in my opinion, digital security is not seen as a priority and therefore<br />
one is less likely to see organizations changing their behavior. It is<br />
more a fad and only in a select number of cases considered a priority<br />
and integrated into the organizational systems and the daily behavior<br />
of organizational staff and their affiliates.<br />
I believe that Sudanese institutions/organizations are more a<br />
reflection of the culture/tradition. Sudanese have an oral tradition of<br />
communication. Information is conveyed and communicated orally<br />
rather than in writing or digitally, even within organizations. This has in<br />
general been a cause of the inability of our organizations to become<br />
sustainable and institutionalized. As such digital security becomes<br />
a concern only when the organization’s business (in all senses) is<br />
transacted digitally rather than verbally. Without a real effort of civil<br />
society organizations to institutionalize we are less likely to see an<br />
importance attached to digital security.<br />
Q3. Are there any examples of protecting privacy that come<br />
to mind from Sudan that reflect good practice from within<br />
organized elements, when using information communications<br />
technologies in general?<br />
I can only speak from our experience at SUDIA. We have increasingly<br />
begun to value digital security and efficiency. This is reflected in the<br />
use of applications such as Google Drive and all the applications<br />
that come with it. Documents are shared and worked on by staff in<br />
the cloud, where document owners prescribe the level of sharing<br />
and the person/s with whom they would like to share documents.<br />
Collaboration on projects is also increasingly being shifted from<br />
the real world to the virtual, where platforms such as Mavlink and<br />
Basecamp allow people to collaborate on projects virtually and<br />
without having to be in the same physical space. These platforms of<br />
collaboration not only contribute to greater digital security but they<br />
also help build an institutional memory in relation to projects and<br />
offer a source of learning and reflection.<br />
Q4. Any parting thoughts?<br />
Firstly, digital security, like other internal organizational systems,<br />
will only take root in organizations when organizations have<br />
reached a certain level of maturity, where they begin to recognize<br />
the need to develop their internal systems if they are to continue<br />
to flourish and grow. Secondly, the leadership or top management<br />
within organizations will need to have a genuine appreciation and<br />
recognition that digital security is needed and will contribute to the<br />
organization’s growth and sustainability. Finally, yet importantly,<br />
digital security is oftentimes about changing digital behavior and<br />
DIGITAL SECURITY<br />
5
154<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
norms, i.e. how we do things. That is the most difficult part. Making<br />
sure to log off your email account, frequently changing passwords,<br />
switching to using different programs and apps that one might not<br />
be used to, etc. Without perseverance and constant observation,<br />
even systems and policies that might be introduced might fail to<br />
bring about the required sustainable level of digital security within our<br />
civil society organizations.
Conclusion<br />
CONCLUSION
156<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Conclusion<br />
<strong>Social</strong> change is messy, complex, and often<br />
requires a timeframe of several generations, with<br />
the bulk of the work taking place offline – on the<br />
ground. Technology is therefore only one small<br />
ingredient in a complicated web of requirements.<br />
In oppressive environments especially, the important role of ICTs in<br />
amplifying marginalized voices, creating complex networks and allowing<br />
people, beyond the usual like-minded crowd, to connect and dialogue in<br />
relatively safer spaces, is likely to remain relevant in the foreseeable future.<br />
Every decade or so there are new innovations and trends in ICTs that<br />
change the fabric of human interaction. Therefore, technology itself is<br />
ephemeral, and what is more lasting is how individuals, organized groups<br />
or communities, whether loosely organized or institutionalized, use ICTs to<br />
peacefully address social justice challenges and to bring about peaceful<br />
social change. Hence, the focus of this guidebook has been on strategies,<br />
tactics and ICT-based tools that enable such social change to happen; as<br />
opposed to explaining how the technologies themselves work.<br />
One longer-term value this guidebook hopes to offer is through the in-depth<br />
interviews with a diverse array of experts and practitioners, and the case studies<br />
that provide a wealth of practical perspectives on how collective organized<br />
action that is using ICTs strategically and creatively (and often in oppressive<br />
and/or developmentally challenging environments), can lead to positive change.<br />
This guidebook, to some extent, also offers a focus on clarifying processes<br />
and workflow when using ICTs for organized campaigning, such as the<br />
sections on “How to Organize a <strong>Social</strong> <strong>Media</strong> Advocacy Campaign” or<br />
“How to Run a Successful Crowdfunding Campaign”. While capturing,<br />
documenting and improving upon processes and workflow may seem<br />
simple or natural for institutionalized civil society groups, a sizable amount<br />
of collective action today is taking place by citizens who are connecting and<br />
networking offline and online, without prior experience in campaigning or<br />
activism. And who are organizing horizontally and in a decentralized fashion<br />
and pouring a lot of effort into identifying processes that work for them –<br />
often having to start from scratch every single time and failing to document<br />
or keep a track record that others can build upon.<br />
The possibility of allowing civil society, as well as all citizens, to organize<br />
more strategically is an opportunity that calls for creating more robust,<br />
multilingual platforms that make such knowledge about easy-to-follow<br />
steps and successful digital campaigning tactics and case studies more<br />
readily available in an accessible, non-technical language. In this regard this<br />
guidebook only touched the surface.
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong> 157<br />
Notes<br />
CONCLUSION
158<br />
<strong>Strategic</strong> <strong>Use</strong> of <strong>New</strong> <strong>Media</strong> for <strong>Peaceful</strong> <strong>Social</strong> <strong>Change</strong><br />
Notes